Incorporating Cybersecurity Education into the CS curriculum Stephen Cooper, Stanford University.

Slides:



Advertisements
Similar presentations
TAILS: COBWEB 1 [1] Online Digital Learning Environment for Conceptual Clustering This material is based upon work supported by the National Science Foundation.
Advertisements

Network Routing Algorithms Patricia Desire Marconi Academy, CPS IIT Research Mentor: Tricha Anjali This material is based upon work supported by the National.
Sound - Friday Feedback Session Team Leader: Marta Datwyler Team Members: David Krumwiede Goldeen Bell Sookki MinPatricia Dymowski Aamir Ashiqali This.
Jill Snyder The Wheatlands Elementary School Oswego CUSD #308 IIT Research Mentor: Dr. Cindy Hood This material is based upon work supported by the National.
Network Routing Algorithms Patricia Désiré Marconi Academy, CPS IIT Research Mentor: Dr. Tricha Anjali This material is based upon work supported by the.
Reading and Writing in Science: Multiple Text Types in Scientific Literacy Learning Elizabeth Birr Moje LeeAnn M. Sutherland Tanya Cleveland Mary Heitzman.
But is it effective? Assessing the impact of a historically based unit David W. Rudge, Biological Sciences & The Mallinson Institute for Science Education,
“ALICE in LEGOLAND” - Friday Feedback Session Group: J Group Leader: Denise McBroom Group Members: Mary Beth CorbinNoor Khan Scott TavesSyed Warisi Saleha.
Welcome and Overview Richard Anderson University of Washington June 30, 20081IUCEE: Welcome and Overview.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
WIP – Using Information Technology to Author, Administer, and Evaluate Performance-Based Assessments Mark Urban-Lurain Guy Albertelli Gerd Kortemeyer Division.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.
Spreading Curricular Change in PDC: Some Practical Tools This material is based on work supported by the National Science Foundation under Grant Nos. DUE / /
Communicating a Design Proposal By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No
Elizabeth DeBartolo, Ph.D.Date Associate Professor, Mechanical Engineering Certificate of Completion is hereby granted to [Name Here] to certify that she.
Numerical Methods Part: Simpson Rule For Integration.
CO2 and Temperature Investigation Does global climate data show evidence of a relationship between the carbon dioxide (CO2) in the atmosphere and average.
Best Practices for Introductory Computer Science Valerie Barr, Jessica Bayliss, Monisha Pulimood, Susan Rodger, Ursula Wolz.
Dorothy Communication Dorothy Interface Robot Sensors Scribbler Robot(IPRE, 2010) Handler connection Background Dorothy, is a 3D/robotics programming environment.
What are some challenges ELL students face? Think of your content area ELL challenge!
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Support For Research & National Identity Snapshot Jim Leous, Penn State Ann West, Internet2/InCommon Federation.
Updated September 2011 Medical Applications in Nanotechnology Nano Gold Sensors Lab.
This material is based upon work supported by the National Science Foundation under Grant No and Any opinions, findings, and conclusions.
November 10, 2015 National BILT meeting1 National Business and Industry Leadership Team (BILT) Meeting for Networking and Convergence Technology November.
Product Project Prototype Standards 2P, Q 9F, H This material is based upon work supported by the National Science Foundation under Grant No
CS 161 Computer Science I Andrew Scholer
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
“Smart pedagogy” Near term: implement Berkeley lower- division CS curriculum at U.C. Merced Longer term: implement and evaluate innovations in engineering.
Chemical Reactions & Electricity
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
E-valuating Website Usage and Social Media This material is based upon work supported by the National Science Foundation under grant number Any.
Functional Processing of Collections (Advanced) 6.0.
CS education: teaching computer science. Teaching programming Teaching computer science has become a huge industry: Huge job growth Not enough CS- trained.
“Cool” Cybersecurity Modules: No Grading Required!
“Too much content and so little time!”
Molecules & Fuel Cell Technology
Preliminary Data Analyses
Scope of this workshop and that of curriculum initiative (What?)
Numerical Methods Multi Dimensional Direct Search Methods - Example
Functional Processing of Collections (Advanced)
Discussion and Conclusion
Clemson University: Jill Gemmill
Adaptive Learning: Background, Applications and Lesson Building
Adaptive Lessons for Pre-Class Preparation for a Flipped Classroom
Rui Wu, Jose Painumkal, Sergiu M. Dascalu, Frederick C. Harris, Jr
Nanotechnology & Society
Critical - thinking Assessment Test (CAT)
Nanotechnology & Society
COS 260 DAY 10 Tony Gauvin.
Title of Poster Site Visit 2017 Introduction Results
Title of session For Event Plus Presenters 12/5/2018.
Black Box Software Testing Fall 2004
Information Technology Pathway Updates
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Adaptive Lessons for Pre-Class Preparation for a Flipped Classroom
Functional Functions: Transfer of Math Proficiency in Physics and Chemistry Elizabeth Grotemeyer, Jennifer Delgado, Sarah Rush, Drew Vartia, Chris Fischer.
Guest lecturer: Isabel K. Darcy
Flash Talk: Instructional Strategies, Successes, and Challenges
Introducing Entrepreneurship to Ursinus College: Pitfalls and Progress
Title of Poster Site Visit 2018 Introduction Results
BLOW MINDS! TEACH PHYSICS
BLOW MINDS! TEACH MATH TEACHING: WORTH IT IN MORE WAYS THAN YOU MIGHT THINK... Most people underestimate teacher salaries by $10,000-$30,000 Most teaching.
BLOW MINDS! TEACH CHEMISTRY
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
BLOW MINDS! TEACH SCIENCE
Project Title: I. Research Overview and Outcome
Presentation transcript:

Incorporating Cybersecurity Education into the CS curriculum Stephen Cooper, Stanford University

Stanford TRUST educational efforts Courseware (Mitchell) – courseware.stanford.edu – Course management system Social networking features Good support for multiple media (including video)

Stanford TRUST educational efforts Video courses – AI (Thrun and Ng) and DB (Widom) More than 200K students – Plans for security (Dawn Song, Berkeley, Boneh, and Mitchell) Currently videos being recorded

My work Incorporating security content into existing courses – Ethics – Introductory programming* * This material is based upon work supported, in part, by the National Science Foundation under Grant DUE Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation

Ethics A required course for CS majors at many colleges o Typically taught using case studies across a wide range of topics within CS

Ethics - 1 An alternate approach o Theme the course around cybersecurity o Invite speakers from government, industry, and academia to speak on specific topics o E.g. Michael Caloyannides (former chief scientist at CIA) speaking about anonymity o E.g. Ruth David (CEO, Analytic Serivces), speaking on international challenges o Videotaping lectures to make them widely available

Ethics - 2 Some topics naturally involve cybersecurity – E.g. hacking Some topics get increase emphasis – E.g. privacy Some topics don’t fit well – E.g. philosophical backgrounds (Kant, Mills, etc.)

Introductory programming and secure coding Approach – Change the content/context of several introductory programming laboratory exercises to use examples taught as part of secure coding – Otherwise, the course should be identical Assumption – That the introductory programming course uses closed labs Added feature – Playing a serious game which introduces the secure programming concept

Pairing of CS1 concepts with secure coding concepts CS1 concept Strings Tbd Parameter passing Tbd Functions Data types Serious programming concept Validating input Array bounds checking Buffer overflow Operator precedence Rounding errors Return values Numeric over/underflow

Questions?