1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 Towards a Discipline of Mission-Aware Cloud Computing (A Position Paper) Ravi Sandhu Executive Director and Endowed Professor October 2010
1 Laws of Cyber Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor July 27, 2011
1 Views of Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair March 25, © Ravi Sandhu.
1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
What can Technologists learn from the History of the Internet?
Security and Privacy in the Networked World
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Introduction to Cyber Security
Introduction and Basic Concepts
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
Cyber Security Research: Applied and Basic Combined*
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
Cyber Security and Privacy: An Optimist’s Perspective
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Institute for Cyber Security Overview
Challenge-Response Authentication
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
World-Leading Research with Real-World Impact!
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
Presentation transcript:

1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

 Cyber technologies and systems have evolved  Cyber security goals have evolved  Computer security  Information security = Computer security + Communications security  Information assurance  Mission assurance  Cyber security research and practice are loosing ground © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Cyber Security Status

3 World-Leading Research with Real-World Impact! Graduate Cyber Security Education Tech- Light Tech- Heavy Tech- Medium

Cyber Security as a Discipline © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Computer Science and Engineering Cyber Security

Cyber Security as a Discipline © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Computer Science and Engineering Cyber Security

 Too much material to teach  Growing faster than teachers can keep up  Computer science theory  Computer system principles and practice  Cyber security theory  Cyber security system principles and practice  Statistics, sociology, organizational theory, economics, psychology, game theory ….  Laws, regulations, compliance ….  Privacy ….  History, successes and failures  ….. © Ravi Sandhu 6 World-Leading Research with Real-World Impact! Fundamental Challenge I The packaging challenge

 Immature field  What is fundamental to cyber security?  Where are the boundaries of a cyber system?  What are the goals of cyber security? © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Fundamental Challenge II The discipline challenge

 Enable system designers and operators to say: This system is secure © Ravi Sandhu 8 World-Leading Research with Real-World Impact! Cyber Security Goal

 Enable system designers and operators to say: This system is secure  There is an infinite supply of attacks © Ravi Sandhu 9 World-Leading Research with Real-World Impact! Cyber Security Goal Not attainable

 Enable system designers and operators to say: This system is secure enough © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Cyber Security Goal Many successful examples

 The ATM (Automatic Teller Machine) system is  secure enough  global in scope  Not attainable via current cyber security science, engineering, doctrine  not studied as a success story  Similar paradoxes apply to  on-line banking  e-commerce payments © Ravi Sandhu 11 World-Leading Research with Real-World Impact! The ATM Paradox

 Enable system designers and operators to say: This system is secure enough  In an innovative ecosystem the innovation drive will ensure that the bar for enough will be fairly low © Ravi Sandhu 12 World-Leading Research with Real-World Impact! Cyber Security Goal

Productivity-Security  Cyber Security is all about tradeoffs © Ravi Sandhu 13 World-Leading Research with Real-World Impact! ProductivitySecurity Let’s build it Cash out the benefits Next generation can secure it Let’s not build it Let’s bake in super-security to make it unusable/unaffordable Let’s sell unproven solutions There is a middle ground We don’t know how to predictably find it

 Develop a scientific discipline  to predictably find the sweet spots for different application and mission contexts  to predictably find, incentivize and deploy microsec that leads to desirable macrosec outcomes  that can be meaningfully taught in Universities at all levels: BS, MS, PhD  Prognosis  we shall succeed (we have no choice)  but we need to change to succeed © Ravi Sandhu 14 World-Leading Research with Real-World Impact! Grand Challenges

15 ICS Projects  Secure information sharing  Social network security  Secure data provenance  Attribute based access control  Botnet and malware analysis  Smart grid security  Hardware security  Future internet © Ravi Sandhu World-Leading Research with Real-World Impact!