Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.

Slides:



Advertisements
Similar presentations
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
Advertisements

1 Towards a Discipline of Mission-Aware Cloud Computing (A Position Paper) Ravi Sandhu Executive Director and Endowed Professor October 2010
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
Designing Educational Opportunities for the Hazard Manager of the 21 st Century Deborah Thomas Dept. of Geography & Env. Sciences University of Colorado.
CYBER TECHNICIAN 1-YEAR CERTIFICATE PROGRAM. CYBER TECHNOLOGY Developing talent. On demand Train for a new career in as little as one year –Work toward.
Cyber Education Project Accreditation Committee November 2014.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
1 Exploring NSF Funding Opportunities in DUE Tim Fossum Division of Undergraduate Education Vermont EPSCoR NSF Research Day May 6, 2008.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
A Critical Infrastructure Testbed for Cybersecurity Research and Education Ai Onda, Kalana Pothuvila, Joseph Urban, and Jordan Berg Abstract Awareness.
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
College of Agriculture and Life Sciences One of 10 TAMU Colleges Provost, President 3 missions: Teaching, Research, Service One of 5 Agrilife partners.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Prof. Dr. Muzaffer ELMAS President of Sakarya University Quality Oriented Management of Sakarya University.
It’s a Give and Take World ITEA Conference San Antonio, Texas.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Wayne Patterson Director of the Cybersecurity Research Center November 28, 2011 Howard University Cybersecurity Research Center.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.
Computer Aided Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
Center for Cybersecurity Research and Education (CCRE)
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
The CS Program at UHCL UHCL Open House 2005 Oct 1, 2005 Dr. Kwok-Bun Yue Associate Professor, CS Chair, CIS University of Houston-Clear Lake.
The Hiring Process: A Student and Employer’s View Dr. Ann Beheler Collin College Frisco, TX STEMtech 2014 Supported by: The National Science Foundation.
Transfer Workshop. HOW TO TRANSFER FROM R-CCC Make a transfer plan A successful transfer involves careful planning and takes time to develop. Any student.
1 Veterans in STEM June Challenge Opening Session KC BANCS is supported by the National Science Foundation under NSF Award Any opinions, findings,
May 12, 2015 National BILT meeting1 National Business and Industry Leadership Team (BILT) Meeting for Networking and Convergence Technology May 12, 2015.
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Engineering programs must demonstrate that their graduates have the following: Accreditation Board for Engineering and Technology (ABET) ETP 2005.
Using Curriculum to Change the Culture in Engineering Rebecca A. Atadero Keywords: Diversity, Inclusion, Engineering Identity Collaborators: Karen Rambo-Hernandez,
Society for Maintenance and Reliability Professionals (SMRP)
Department of Computer and Information Sciences

CSE Strategic Planning Background
Discussion and Conclusion
Information Security at Florida State University
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Clemson University: Jill Gemmill
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
ACM/IEEE-CS Computer Science Curriculum
Cyber Security Research: Applied and Basic Combined*
Critical - thinking Assessment Test (CAT)
Cyber Security Research: Applied and Basic Combined*
Information Security at Florida State University
Institute for Cyber Security: Research Vision
How to Be Ready for a Successful STEM Career
Information Security at Florida State University
Title of Poster Site Visit 2017 Introduction Results
Title of session For Event Plus Presenters 12/5/2018.
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
Introduction to Information Assurance
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Title of Poster Site Visit 2018 Introduction Results
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
World-Leading Research with Real-World Impact!
CESP Overview VISION: Translate innovations in energy science into policy recommendations regarding energy security, sustainability and resilience.. Explore.
Presentation transcript:

Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Day 2 Summary November 9, 2012 Support for this work was provided by the National Science Foundation’s Federal Cyber Service: Scholarship for Service (SFS) program under Award No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Announcement In the process of setting up a web site. All presenters send slides to

Day 1 Summary What is critical infrastructure? What are some of the challenges? What are potential solutions?

Day 2 Summary Ronnie Killough, Southwest Research Institute  Oil & gas, Transportation, SmartGrid, Nuclear power, Railroads, Water resources  What’s unique about security for cyber-physical systems? Multi-disciplinary, Domain-specific, non-standard, operational constraints  Cyber-physical project examples (multi-disciplinary) Design for security, worldwide client base Penetration testing (meters), risk vs. cost to secure, deployment, communications Security research (automotive)  Soft skills, multi-disciplinary, SW/HW/Networking: need new skills  Course on critical infrastructure domains, balance breadth/depth, provide divergent paths for security development vs penetration testing

Day 2 Summary Ravi Sandhu, UT San Antonio  Cybersecurity for graduate education  Is cybersecurity becoming a discipline separate from CSE?  Vance: science of cyberspace, cyberspace is everywhere in every domain  The packaging challenge? What is the core of this discipline?  There is an infinite supply of attacks.  “The system is secure enough” – the bar for “enough” is fairly low  ATMs, online banking/ecommerce (simple success stories) – not attainable via current cyber security science, engineering, doctrine  Develop a scientific discipline – find sweet spots for different applications, need microsec that leads to desirable macrosec (as in critical infrastructure)  Changes are need to achieve a scientific discipline

Day 2 Summary Chris Kulander, School of Law Panel  Oil and gas (strategic national interest): networked real-time data transfer  Theft of customer data, seismic data, proprietary info.  Sabotage: infiltration (foreign governments), attack of power grids, vandalism, monkey-wrenching  Control Point – Survey Act Victoria Sutton, School of Law Panel  Cybersecurity law education for lawyers  Developing a cybersecurity law certificate  Cybersecurity law landmark cases

Day 2 Summary Suku Nair, Southern Methodist University  HACNet – security and reliability  MS in Security Engineering  Admission requirements: many don’t have CS backgrounds, need one year of experience in Information Assurance  Different delivery modes (on campus, distance, on-site executive, hybrid)  NSF Center (I/UCRC) and NSA Center of Academic Excellence

COE Panel Comments: Need to go back to the basics of deep computing knowledge for computing- oriented cybersecurity backgrounds.

Where do we go from here? Suggestions: