Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Day 2 Summary November 9, 2012 Support for this work was provided by the National Science Foundation’s Federal Cyber Service: Scholarship for Service (SFS) program under Award No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Announcement In the process of setting up a web site. All presenters send slides to
Day 1 Summary What is critical infrastructure? What are some of the challenges? What are potential solutions?
Day 2 Summary Ronnie Killough, Southwest Research Institute Oil & gas, Transportation, SmartGrid, Nuclear power, Railroads, Water resources What’s unique about security for cyber-physical systems? Multi-disciplinary, Domain-specific, non-standard, operational constraints Cyber-physical project examples (multi-disciplinary) Design for security, worldwide client base Penetration testing (meters), risk vs. cost to secure, deployment, communications Security research (automotive) Soft skills, multi-disciplinary, SW/HW/Networking: need new skills Course on critical infrastructure domains, balance breadth/depth, provide divergent paths for security development vs penetration testing
Day 2 Summary Ravi Sandhu, UT San Antonio Cybersecurity for graduate education Is cybersecurity becoming a discipline separate from CSE? Vance: science of cyberspace, cyberspace is everywhere in every domain The packaging challenge? What is the core of this discipline? There is an infinite supply of attacks. “The system is secure enough” – the bar for “enough” is fairly low ATMs, online banking/ecommerce (simple success stories) – not attainable via current cyber security science, engineering, doctrine Develop a scientific discipline – find sweet spots for different applications, need microsec that leads to desirable macrosec (as in critical infrastructure) Changes are need to achieve a scientific discipline
Day 2 Summary Chris Kulander, School of Law Panel Oil and gas (strategic national interest): networked real-time data transfer Theft of customer data, seismic data, proprietary info. Sabotage: infiltration (foreign governments), attack of power grids, vandalism, monkey-wrenching Control Point – Survey Act Victoria Sutton, School of Law Panel Cybersecurity law education for lawyers Developing a cybersecurity law certificate Cybersecurity law landmark cases
Day 2 Summary Suku Nair, Southern Methodist University HACNet – security and reliability MS in Security Engineering Admission requirements: many don’t have CS backgrounds, need one year of experience in Information Assurance Different delivery modes (on campus, distance, on-site executive, hybrid) NSF Center (I/UCRC) and NSA Center of Academic Excellence
COE Panel Comments: Need to go back to the basics of deep computing knowledge for computing- oriented cybersecurity backgrounds.
Where do we go from here? Suggestions: