Anatomy, Dissection, and Mechanics of an Introductory Cyber-Security Course’s Curriculum at the United States Naval Academy By Raymond Greenlaw.

Slides:



Advertisements
Similar presentations
Stevens Institute of Technology Security Systems Engineering
Advertisements

Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
David A. Brown Chief Information Security Officer State of Ohio
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1 Interconnecting Cisco Networking Devices Part 1 (ICND1 v1.0)
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
INFORMATION SYSTEMS & GLOBAL SERVICES Craig Solem, CISSP Lockheed Martin Information Systems and Global Services Program Manager, Joint Medical information.
By Raymond Greenlaw United States Naval Academy, Annapolis, Maryland Chiang Mai University, Chiang Mai, Thailand Ray gratefully acknowledges partial support.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Network Security Overview Tales from the trenches.
1 July 08, 2010 Information Security Officer Meeting.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Network Security and Personally Managed Computers Jordan K. Wiens Copyright Jordan K. Wiens 2004.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
A First Course in Information Security
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Welcome This presentation explains what you need to know and do to prepare for the Oracle Academy Pre-Institute virtual training.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
NEWLY COMMISSIONED OFFICER VACANCY ANNOUNCEMENT NEW YORK AIR NATIONAL GUARD 174th ATTACK WING 6001 EAST MOLLOY ROAD SYRACUSE, NY ANNOUNCEMENT#:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Web-based E-commerce Architecture
Computer & Network Security
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
CSCE 727 Information Warfare
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Wrap-up. Goals Have fun! Teach you about Cyber Defense so that you can: –Interest your students in Cyber Defense –Teach your students about Cyber Defense.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Module 11: Designing Security for Network Perimeters.
Center for Cybersecurity Research and Education (CCRE)
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
MIDN Zac Dannelly. May 2009: President's 60-day Cyberspace Policy Review – "expand and train the workforce” May 2010: The Ad Hoc Committee on Cyber Security.
Cyber Storm Overview Wednesday 2/1/ PT. Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace.
1 NES554: Computer Networks Defense Course Overview.
Introduction to Internet Security : Mechanisms, Protocols, Services & Management John K. Zao, PhD SMIEEE Office: EC-527 Telephone: #31470
Web Application Development 1 Course Introduction.
Information Security tools for records managers Frank Rankin.
INTRO TO CYBER SECURITY [SI110] LT Brian Kiehl |
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Introduction to Web Technologies Module Introduction to Web Technologies – CS th January 2005 Dr Bogdan L. Vrusias
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Information Security Officer Meeting
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
CyberPaths Interdisciplinary Modules
ACM/IEEE-CS Computer Science Curriculum
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Li Yang, Carson Woods (University of Tennessee at Chattanooga
Csilla Farkas Cybersecurity Csilla Farkas
How to Mitigate the Consequences What are the Countermeasures?
Information Assurance & Network Security Certificate
Cloud-based Resources for Cybersecurity Education and Training
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
PLANNING A SECURE BASELINE INSTALLATION
ICT ASSOCIATE PROFESSIONAL
CyberPaths Interdisciplinary Modules
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Anatomy, Dissection, and Mechanics of an Introductory Cyber-Security Course’s Curriculum at the United States Naval Academy By Raymond Greenlaw

Co-authors Christopher Brown, Frederick Crabbe, Rita Doerr, Chris Hoffmeister, Justin Monroe, Donald Needham, Andrew Phillips, Anthony Pollman, Stephen Schall, John Schultz, Steven Simon, David Stahl, and Sarah Standard Raymond Greenlaw United States Naval Academy 2

Outline 1.History 2.Course Overview 3.The Cyber Battlefield 4.Models and Tools 5.Cyber Operations 6.Some Thoughts 7.Questions 3 Raymond Greenlaw United States Naval Academy

History US Naval Academy (USNA) Mission President Obama’s May 2009 Cyberspace Policy Review USNA Cyber Warfare Ad Hoc Committee USNA Ad Hoc Committee on Cyber-Security Curriculum Options Six Months to Implement 4 Raymond Greenlaw United States Naval Academy

Overview: Course Mission Educate each midshipman about cyber infrastructure and systems, inherent cyber vulnerabilities and threats, and appropriate defensive security procedures, thereby enabling them to make principled decisions regarding the potential benefits, consequences, and risks from a proposed use of an information system in today’s cyber- warfare environment. 5 Raymond Greenlaw United States Naval Academy

Overview: Goals 1.Understand basic physical and virtual architecture of cyberspace— individual computer and program, physical components and protocols of network and Internet, and web, 2.hands on experience with components of physical and virtual architecture of cyberspace and ability to relate that experience to larger system, 3.an understanding of DoD’s pillars of IA (CIANA), inherent vulnerabilities of information systems that endanger these properties, defensive measures to ensure information systems retain these properties, and offensive measures to violate these pillars, and 4.hands on experience with defensive and offensive practices in cyberspace, and ability to relate that experience to new or more sophisticated attacks and defenses. 6 Raymond Greenlaw United States Naval Academy

Overview: Mechanics 2 hours lecture, 2 hours lab; 3 credits Laptops Software installation Resource page Weekly instructors’ meetings list Networking issues 7 Raymond Greenlaw United States Naval Academy

The Cyber Battlefield 1 Introduction Digital Data 1 & 2 Computer Architecture PC Vivisection Lab Operating Systems 1 & 2 Programs Parts 1 ‒ 5 Web: Servers, Browsers, and HTML Web: Build Your Webpage Lab 8 Raymond Greenlaw United States Naval Academy

The Cyber Battlefield 2 Web: Client-Side Scripting: non-event driven, event driven, and forms Web: Server-Side Scripting Web: Injection Attacks & XSS Networks, Protocols, the Internet: Parts 1 ‒ 4 Networks: Build a LAN Prep Networks: Build a LAN Lab Networks: Wireless Networking Networks: Build a Wireless-Network Lab 9 Raymond Greenlaw United States Naval Academy

Models and Tools Information Assurance Firewalls Authentication/Cryptography Parts 1 ‒ 4 Authentication/Cryptography: X.509 Certificates Lab 10 Raymond Greenlaw United States Naval Academy

Cyber Operations 1 Forensics Phases of a Cyber Attack/Recon Forensics Lab Network Attack Cyber Recon Lab Network Defense Malware 11 Raymond Greenlaw United States Naval Academy

Cyber Operations 2 Cyber Attacks: Case Studies Cyber Attack Lab Attack Lab Debrief Cyber Defense Lab Defense Lab Debrief Raymond Greenlaw United States Naval Academy 12

Some Thoughts Diverse group of instructors Manpower required Instructor commitment Investment in software, hardware, and support Materials Ongoing development Non-technical students Student performance Student retention Workload Raymond Greenlaw United States Naval Academy 13

Questions? Dr. Raymond Greenlaw United States Naval Academy Raymond Greenlaw United States Naval Academy 14