Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.

Slides:



Advertisements
Similar presentations
Health IT Workforce Development Programs Chitra Mohla, M. Sc. Director, Workforce Programs Office of Provider Adoption Support (OPAS) July 31, 2012.
Advertisements

Pre-engineering Education Collaborative: Providing for the Education of American Indian Engineers A Collaboration between: College of Menominee Nation.
1 April 12, 2010 Information Security Officer Meeting.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
U.S. Department of Energy Office of Science Advanced Scientific Computing Research Program How to write a good HBCU Proposal George Seweryniak DOE Program.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
The Department of Computer Science offers three levels of studies - Two three-years undergraduate programs Laurea in Informatica Laurea in Informatica.
Human Resource Development Mgt 263 Bryan Andrews Hospitality Administration.
Collaboration with Faculty: What They Don’t Teach You in Library School Sarah Jane Dooley ASEE/ELD Session 1441 June 15, 2009.
Successful Graduation Projects
Future Faculty Program Overview November Goals Increase number of Ph.D. graduates who obtain academic positions –Especially at top-50 engineering.
1 Short Course on Grid Computing Jornadas Chilenas de Computación 2010 INFONOR-CHILE 2010 November 15th - 19th, 2010 Antofagasta, Chile Dr. Barry Wilkinson.
1 Exploring NSF Funding Opportunities in DUE Tim Fossum Division of Undergraduate Education Vermont EPSCoR NSF Research Day May 6, 2008.
Funding Opportunities NSF Division of Undergraduate Education North Dakota State University June 6, 2005.
College Strategic Plan by
1 Workshop 20: Teaching a Hands-on Undergraduate Grid Computing Course SIGCSE The 41st ACM Technical Symposium on Computer Science Education Friday.
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
IT in Education. No. of Students Enrollment Rate Annual Increase Employees Schools Budget General Education 1,100,000 98,7% 6% 47, US$M.
Overview CSE 465 Information Assurance
The Howard-UTEP/AGEP Alliance: Unique and Irreplaceable Orlando L. Taylor Vice Provost for Research Dean, Graduate School Howard University Washington,
NSF Programs That Support Research in the Two-Year College Classroom  V. Celeste Carter, National Science Foundation Jeffrey Ryan, University of South.
Commonwealth Engineering Design (CED) Academy Learning K-12 Science through Engineering Design and Manufacturing.
Grants as Planning Stepping Stones: Strategic Initiatives for Engagement with India at Winston-Salem State University UNC India Summit UNC General Administration.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
UTIA Promotion & Tenure Workshop May 19, 2015 UTIA Promotion & Tenure Workshop May 19, 2015 Overall Philosophy: Maximize faculty FTE while maintaining.
Company LOGO Broader Impacts Sherita Moses-Whitlow 07/09/09.
CEEDAR Cross State Convening Overview: Innovation Configurations Course Enhancement Modules H325A
1 Ideas to Action (i2a) and Speed School: Recent Activities and Implementation Plans Speed School: Gerald Evans, Ph.D. Patricia Ralston, Ph.D.
NYIT TUES Evaluation May 2014 Dr. Sarah McPherson Evaluator NYIT School of Education.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Evaluating Educational Technology and Integration.
The CS4Alabama CE21 Project Goals Alabama participation in current CS AP has been very low (with 220k HS students; 5200 US History and 120 Latin AP exams):
THE REGIONAL CENTER FOR ADVANCED MANUFACTURING (RCAM) Addressing the Needs of Chemical Process Operations.
A little history… CCCS Consortium Grants Colorado Lumina Initiative, Lumina Foundation A forerunner for the developmental education redesign.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Teacher Training Program For Certificate in Information Technology Empower Yourself 9/23/20151 International Institute of Information Technology - Hyderabad.
Implementation and Management of an Information Systems Practicum in a Graduate Computer Information Technology Curriculum S amuel C onn, Asst. Professor.
Computing and Technology Department School of Science and Technology BS in Information Technology CIP Code Program Code 414 Fall 2010 Program Quality.
Responsible Conduct of Research (RCR) What is RCR? New Requirements for RCR Who Does it Affect? When? Data Management What is the Institutional Plan? What.
CSCE 727 Information Warfare
Introduction to WRESTT (WISTPC 2014:2) July 18th, FIU Main Campus A Cyber Enabled Learning Environment of Software Testing Education Supported by.
FACULTY OF ORGANIZATIONAL SCIENCES UNIVERSITY OF BELGRADE FACULTY OF ORGANIZATIONAL SCIENCES Studies in INTERNET TECHNOLOGIES & ELECTRONIC BUSINESS Božidar.
Baylor CSI by the numbers Faculty: 16 (tenured, tenure-track, lecturers) Students: ~325 ~18 MS students 5 degrees: BS, BSI, BA, CSF, MS.
Department of Computer and Information SciencesMay 5th, 2004 HOMMER: Holistic Model for Minority Education & Research.
Christy Chatmon and Hongmei Chi Based on paper published in: InfoSecCD 2010 Information Security Curriculum Development Conference ACTIVE LEARNING APPROACHES.
Office of Undergraduate Studies Freshman Engineering (FE) All new freshmen (FS2013) take a 30-question spatial skills test online prior to their PRO day.
1 Integration of Information Literacy into the Biology Curriculum Department of Physics and Astronomy, and Biophysics Ilo-Katryn Maimets, Science Librarian.
Learning Streams: A Case Study in Curriculum Integration Mani Mina, Arun Somani, Akhilesh Tyagi, Diane Rover, Matthew Feldmann, and Mack Shelley Iowa State.
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
FAMLEARNS Project Steering Committee Meeting September 22, :30 – 1:30 PM 113 Tucker Hall.
Grant Proposal Writing Workshop The Graduate School University of Arkansas February 5, 2010.
Computer Support and Information Tech Advisory Date: Wednesday, October 14, 2015 Time: 8:30—10:00 am Location: Joan Stout, room 244.
By Billye Darlene Jones EDLD 5362 Section ET8004-1B February, 2010.
Planning for School Implementation. Choice Programs Requires both district and school level coordination roles The district office establishes guidelines,
Standards Education 18 March 2009 Steve Mills, Chair, SEC Standards Board Forum.
1 VIE: Vertical Integration of Computer, Electrical, and Mechanical Engineering Education Abhijit Chandra, Julie Dickerson, Matt Feldmann, Don Flugrad,
GSG Grants Workshop February 3, GSG Grants Workshop 2 GSG grants fund graduate students’ research and professional development Graduate students.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
THE OFFICE OF TEACHING & LEARNING Julanna Gilbert.
OAsIS National Centers of Academic Excellence in Information Assurance Education (CAEIAE) Program: OAsIS.
Description of a Process for Enhancing Pre-service Programs to Better Prepare General Education Teachers to Teach Students with Disabilities 2016 CEEDAR.
Teaching Network Security - Lessons Learned Homeland Defense and Security Education Summit February 27 &28, 2007 Margaret Leary Associate Professor Northern.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
VIP Consortium Meeting ● May 12-13, 2016
UNM Information Assurance Scholarship for Service (SFS) Program
EDUCAUSE MARC 2004 E-Portfolios: Two Approaches for Transforming Curriculum & Promoting Student Learning Glenn Johnson Instructional Designer Penn State.
Cybersecurity Workforce Development for the Nation
UNM Information Assurance Scholarship for Service (SFS) Program
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
UNM Information Assurance Scholarship for Service (SFS) Program
Presentation transcript:

Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department Florida Agricultural & Mechanical University

Outline Introduction Educational Material Exchange Adoption and Adaptation Curriculum Development Committee on National Security Systems Mapping Research Activation Lessons Learned Future Directions

Introduction Federal government’s budget for cyber security was $5.6 billion for FY05 INPUT predicts 27% increase by 2009 Companies spent approximately spent $17 billion in 2001 It is projected that companies will spend $45 billion in 2006

Introduction Florida Agricultural & Mechanical University (FAMU) is one of the premiere HBCU’s 13,000 students with 95% being African- American 500 undergrads and 20 graduate students enrolled in Department of Computer and Information Sciences

Introduction FAMU has taken proactive role in forming 11 member State University System of Florida Consortium on Homeland Security Consortium was established to foster collaborative efforts in research and development The FAMU Office of National Security Initiatives spearheads academic efforts related to homeland security

IAEIAE Information Assurance Education

Educational Material Exchange Capacity Building Proposal Submission - 12/02 Capacity Building Awarded – 09/03 FSU shared course materials  Lecture notes  Exams  Textbooks  Lab exercises

Adaptation and Adoption Three courses  Served as model for content and sequence  Exam style  Lab exercises Lab environment  Blueprint for network configuration  Funding resources  Technical support

Adaptation and Adoption Initially offered as Special Topics University approval for new courses – Summer 2004 First offering – Fall 2004  Computer Security (CIS 4360)  Network Security (CIS 4362) First offering – Spring 2005  Applied Security (CIS 4361)

Driven by CNSS mapping Two existing courses  COP Data Structures  CDA Data Communication and Organizational Networks Three new courses  CIS 4360 – Introduction to Computer Security  CIS 4362 – Network Security and Cryptography  CIS 4361 – Applied Security IA Curriculum

Introduction to Computer Security Course Topics  Fundamental concepts such as, confidentiality, integrity, and availability (CIA)  Fundamental challenges of computer security  History of computer security Instructional Methodology  Class lecture and discussion based on assigned text and outside resources  Research projects on various IA topics

Network Security and Cryptography Course Topics  Attack methods such as DoS, malicious code  Basic concepts of cryptography such as algorithms, mechanisms, and protocols  Access control methods Instruction Methodology  Lectures/Discussions conducted by student groups  Research papers on various IA topics

Applied Security Course Topics  Security framework for an organization  Evaluation of Security Tools  User Level Security/OS Security  Vulnerability testing Instructional Methodology  Group discussion based on assigned reading  Group related projects such as labs and presentations

CNSS Mapping FSU provided previous mapping materials Liaison provided insight to the process 4011 – INFOSEC Professional 4014 – Information Systems Security Officer (ISSO) Official Award Ceremony – 9 th Colloquium for Information Systems Security Education (June 2005)

CNSS Mapping

Research Activation Awarded  Capacity Building I (NSF) – Fall 2003  CISCO Equipment Grant – Fall 2004  Security and Mobile Agents (ARO) – Fall 2004  MII (NSF) – Fall 2004 Pending  Capacity Building II (NSF)  Software Engineering for Secure Software (ARO)

Research Activation FAMU Security Research Group  Late Fall 2004  Undergraduate focus, graduate student led  Bi-weekly meetings  Attend FSU research meetings  3 papers  Pipeline for graduate study (Capacity II)

Research Activation

Lessons Learned Location, location, location!!! Willingness to share  Course materials  Lab technical support  Course mapping liaison  Funding connections Satisfied need for elective courses (right courses at the right time) People  Christy Chatmon – faculty member/doctoral student  Chris Moss – FAMU graduate student/FSU graduate courses Participation in the IA community

Future Enhancements Formal recognition of FAMU Center for Secure Computing and Information Assurance (FSCIA) CAEIAE status Pipeline : Undergraduate to Doctoral Additional hands-on laboratory exercises Guest speakers for selected course topics One-hour workshops for campus-wide audience to be given by Applied Security student groups Graduate IA courses

Questions