Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)

Slides:



Advertisements
Similar presentations
New MS (CS) IBA Philosophy and Objectives.
Advertisements

Preparing Graduate Students to Lead and Manage Cyber Security Kevin A. Barton Asst Prof, CISS (210) ext 2213.
Spatial USC John Wilson 22 September 2009.
David A. Brown Chief Information Security Officer State of Ohio
Cyber Education Project Accreditation Committee November 2014.
By Raymond Greenlaw United States Naval Academy, Annapolis, Maryland Chiang Mai University, Chiang Mai, Thailand Ray gratefully acknowledges partial support.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 190 Computing in the Modern World CSE Curricula Fall 2014 Marco Valtorta.
Masters in Financial Mathematics (MFM) Presenter Dr. Paul W. Eloe Chair, Department of Mathematics Date: April 11, 2007.
School of Business University of Bridgeport Admissions Presentation Robert Gilmore, Ph.D. Associate Dean School of Business.
Legal and Ethical Issues in Computer Security
Electronic Digital Computer Mechanic Apprentice Program Cultivating technical skills critical to current & future needs Preparing our workforce to support.
Revised MS Program in Computer Science INFORMATION AND COMPUTER SCIENCE DEPARTMENT October 2002.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Networking Academy Program Prepare Yourself for 21 st Century IT.
Overview CSE 465 Information Assurance
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 190 Computing in the Modern World CSE Curricula Spring 2010 Marco Valtorta.
FACULTY OF ELECTRICAL ENGINEERING DEPT. OF TELECOMMUNICATION ENGINEERING CZECH TECHNICAL UNIVERSITY IN PRAGUE ITU Centre of the Czech Technical.
Welcome to USA DAY at University of South Alabama School of Computer and Information Sciences
Copyright Amy Woszczynski, 2006Master of Science in Information Systems (MSIS) Life After the Undergraduate Degree What’s Next?
MS in Information Systems & Assurance (MS-ISA) Stephen D. Burd Anderson School of Management & UNM Center for Information Assurance Research and Education.
A First Course in Information Security
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Information Assurance Opportunities and Requirements Doug Jimenez, IA Division Director Mary Mayonado, CISSP, IA Program Manager Marla Shipley, CND/aXiom.
Legal and Ethical Issues in Computer Security Csilla Farkas
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
AFCEA/AFA July 23,  There are 35 colleges and universities across the state that are members of the University System of Georgia.  All of them.
Workshop Notes Course development: Free and Open Software Development.
The BTech (IT) Program Xing Liu, Ph.D, Chair Computer Science & Information Technology School of Business Kwantlen Polytechnic University April 30, 2014.
Weekend Program MS in Computer Science with Specialization in Internet and Web Technologies.
Computer Science Graduate Studies in U of Memphis.
Jeff Recor IAC 2003 FISSEA IA Community Outreach March 2005 Jeff Recor Director, IAC.
New M&S Curriculum: The Emerging Strategy Dr. Wayne Summers TSYS Department of Computer Science Columbus State University.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 190 Careers in Computer Science, Computer Engineering, and Computer Information.
Information Technology Lonnie Bentley, Professor and Head Department of Computer Technology (CPT) - and - H. E. (Buster) Dunsmore, Professor Department.
CSCE 727 Information Warfare
Information Technology Programs. Why major in IT? “...Total US IT employment is predicted to double in this decade. Similarly, the security of computer.
Computer Science and Engineering 1 Future of Cyber Security.
KFUPM-COE Industrial Advisory Council Meeting 31/5/ Department of Computer Engineering (COE) College of Computer Sciences and Engineering (CCSE)
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Information and Computation Assurance Programs in the Ohio State University Neelam Soundarajan Computer Sc. & Eng. Dept. Ohio State University.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Associate of Applied Science Degree Information & Telecommunication Technology Scott edu
January 4, School of Computer and Information Sciences Graduate Program Orientation University of South Alabama David L. Feinstein, Ph.D. Dean, School.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
CSCE 727 Industry Certifications in IA. Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by (ISC) 2® Prepared by Robert Ayoub, CISSP,
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Emergency Management and Business Continuity Masters Degree M.J. Chumer, Ph.D. NJIT.
Graduate Recruiting CISE Department Spring 1999 Douglas Dankel II
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Industry Advisory Board
Department of Computer and Information Sciences
Stretch Your Budget With Organizational Membership
Virginia Union University
ACM/IEEE-CS Computer Science Curriculum
Csilla Farkas Cybersecurity Csilla Farkas

UNM Information Assurance Scholarship for Service (SFS) Program
Introduction to Information Assurance
Computer Science Section
UNM Information Assurance Scholarship for Service (SFS) Program
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Computer Science Dr Hwang Chair, Computer Science Department
Presentation transcript:

Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)

Who is Impacted by Cyber Attacks? Source: / /

Computer Science and Engineering 3 Ashley Madison adultery site hack: will I be found out? TheGuardian,

What can we do? Computer Science and Engineering 4

5 Information Assurance Program At USC

Computer Science and Engineering 6 Center for Information Assurance Engineering Mission P ROMOTE INFORMATION SECURITY AWARENESS O FFER HIGH QUALITY EDUCATION AND RESEARCH F OSTER COLLABORATION BETWEEN ACADEMIA, INDUSTRY AND GOVERNMENT

Computer Science and Engineering 7 IA&S Graduate Certificate ProgramIA&S Graduate Certificate Program NEW: Cyber Security Studies CS2NEW: Cyber Security Studies CS2 Approved for 2016 FallApproved for 2016 Fall Meeting National IA Training StandardsMeeting National IA Training Standards National Center of Academic Excellence in Information Assurance Education and ResearchNational Center of Academic Excellence in Information Assurance Education and Research IA Education

What is Cyber Security? Highly Technical People, processes, and technology Legislation and Regulation Risk management

Understanding Cyber Security Risk dreamsmademe.wordpress.com Cyber Security Threats Mobile Malware Virtual currencies Stealth attacks by state actors Social attack New PC and server attacks Cloud-based attacks Source: McAfee Labs 2014 Treats Predictions

Business Policy Decision Communication between technical and administrative employees Internal vs. external resources Legal and regulatory requirements Developing security capabilities Risk Assessment Cost Security level 0 %100% Optimal level of security at a minimum cost Security Investment Cost of Breaches

Workforce Education Certification Government initiatives

National Center of Academic Excellence in Information Assurance Education

Computer Science and Engineering 13 Courses and Faculty Courses CSCE 201 – Introduction to Security CSCE 517 – Computer Crime and Forensics CSCE 522 – Information Security Principles CSCE 557 – Introduction to Cryptography CSCE 548 – Secure Software Construction CSCE 590 – Penetration Testing Faculty  Caroline Eastman  Csilla Farkas  Chin-Tser Huang  Ronni Wilkinson  Wenyuan Xu

Undergraduate-Level IA Specialization Majors: CS, CE, CIS + any other USC major –need necessary prerequisites for CSCE 522 Courses to take: –CSCE 522 – Information Security Principles –1 additional IA course –1 additional course with IA component Computer Science and Engineering 14

Computer Science and Engineering 15 Graduate-Level IA Specialization Majors: CS, CE, CIS, MS, ME, PhD Courses to take: –CSCE 522 – Information Security Principles –2 additional IA courses or MS Thesis in IA

Computer Science and Engineering 16 IA&S Certificate Graduate Program Admission Requirements Baccalaureate degree in computer science, computer engineering, or a related field Admission requirements for graduate study at the Department of Computer Science and Engineering Meets Industry Certification Security + CISSP

Proposed Cyber Security Studies Graduate Certificate Core Courses: –CSCE 522 – Information Systems Security Principles (3 credit hours) –CSCE 715– Network Security (3 credit hours) Elective Courses (6 credits of the following) –CSCE 517 – Computer Crime and Forensics (3 credit hours) –CSCE 557 – Introduction to Cryptography (3 credit hours) –CSCE 548 – Secure Software Construction (3 credit hours) –CSCE 727 – Information Warfare (3 credit hours) –CSCE 813 – Internet Security (3 credit hours) –CSCE Distributed Systems Security (3 credits) –CSCE 824 – Secure Databases (3 credit hours) –CSCE 798 – Directed Study and Research (max. 3 credit hours) Computer Science and Engineering 17

Computer Science and Engineering 18 Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by International Information Systems Security Certification Consortium (ISC) 2® Prepared by Robert Ayoub, CISSP, Global Program Director, Information Security Electronic survey, conducted through a Web- based portal 18

Computer Science and Engineering 19 Demand for IA Workforce Worldwide: –2010: 2.28 million –2015: 4.24 million (projected) –Compound Annual Growth Rate: 13.2% Americas: –2010: 920,845 –2015: 1,785,236 –Compound Annual Growth Rate: 14.2% Information Warfare - Farkas 19

Computer Science and Engineering 20 Salary 2011 Annual salary(ISC) 2® Member/non- member Worldwide: $98,600/$78,500 Americas: $106,900/$92,900 20

Computer Science and Engineering 21 IA Jobs Job market –Civil (Join Information Systems Security Association, ISSA, ) –Government (Internship available at USC-UTS, and SC Dept. of Probation, Parole, and Pardon Services) –Military (Internship available at SPAWAR, Charleston) Education and training requirements (B.S. degree, certification, hands-on experiments) Salary FUN

Computer Science and Engineering 22 IA Research Wenyuan Xu (since 2007) Wireless networking and security, sensor networks, network security and privacy, jamming detection and avoidance Chin-Tser Huang (since 2003) Intrusion detection, wireless security, distributed systems network security, network protocol design and verification Csilla Farkas (since 2000) Web data and application (WS & SOA) security, Access Control Policies, SCADA software reliability, economic and social impact of cyber attacks Application layer Transport layer Internet layer Network Interface

Computer Science and Engineering 23 Contact Information Center for Information Assurance Engineering Department of Computer Science and Engineering