Building Security In: Injecting Security throughout the Undergraduate Computing Curriculum PROBLEM STATEMENT  Secure coding is more important than ever.

Slides:



Advertisements
Similar presentations
National Academy of Engineering of the National Academies 1 Phase II: Educating the 2020 Engineer Phase II: Adapting Engineering Education to the New Century...
Advertisements

What Did We Learn About Our Future? Getting Ready for Strategic Planning Spring 2012.
Integrating Library Resources into the Course Development Process at an Online College ©2009 The Sheridan Libraries of The Johns Hopkins University Inspiration,
Next Generation Science Standards Implementation in Liberal Studies at CSU Bakersfield.
Jennifer Strickland, PhD,
Action Plan Mr. Ahmed Zaki Uddin Mathematics O-Level.
Our Mission: Preparing Students for Postsecondary Success Mansoureh Tehrani R. L. Turner High School
Integrating Quantitative Literacy Resources into the Classroom (originally presented at the Pacific Sociological Meeting in Portland, Oregon, 2014) Social.
Holyoke Public Schools Professional Development By, Judy Taylor
ActionWebs : Education and Outreach ActionWebs Kickoff Meeting December 17, 2009 │Berkeley, California Education Overview Kristen Gates, Ed.D University.
Building Security In: Injecting Security throughout the Undergraduate Computing Security.
Environmental Literacy in North Carolina. North Carolina’s Environmental Literacy Plan The goal of the plan is to produce high school graduates who.
Be a Part of Something Great! Learning Communities at Wayne State.
This work is supported by a National Science Foundation (NSF) collaboration between the Directorates for Education and Human Resources (EHR) and Geosciences.
Industry Advisory Board Department of Computer Science.
May 18, Two Goals 1. Become knowledgeable about the QEP. 2. Consider your role in making the QEP a success.
Cumberland County: May 28 Oak Ridge: June 2 Roane County: June 4 Scott: June 4 Campbell: June 9 Knox: June 10 Loudon: June 11.
Barbara Blummer & Jeffrey Kenton Information Fluency Conference, 2013 March 13, 2013.
Li-Jen Shannon, Peter Cooper, Timothy Mcguire Sam Houston State University Computer Science Department Huntsville, Texas, USA Reframing Computer Education.
Fifth Annual NSF Robert Noyce Teacher Scholarship Program Conference July 7-9, 2010 Enrique Ortiz University of Central Florida Using a Teaching Goals.
Developing an Effective Evaluation to Check for Understanding Susan E. Schultz, Ph.D. Evaluation Consultant PARK Teachers.
1 Open Library Environment Designing technology for the way libraries really work December 8, 2008 ~ CNI, Washington DC Lynne O’Brien Director, Academic.
The 2012 EPSB Writing Study Kentucky Education Professional Standards Board Terry Hibpshman Kim Walters-Parker.
Security 1  26 Modules  CS0, CS1, CS2 o Buffer Overflow o Integer Error o Input Validation  Computer Literacy o Phishing o Cryptography.
Symposium 2001June 24, 2001 Curriculum Is Just the Beginning Chris Stephenson University of Waterloo.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Instruction & Assessment Plan, Melissa Bowles-Terry April 4, 2011.
Enhancing your Teaching and Developing New Leadership: Impact of the On the Cutting Edge Professional Development Program Ellen Iverson, Cathy Manduca,
Math 20: Basic Mathematics and Math 5: Math Learning Strategies Prepared by Ilva Mariani, Math LC Coordinator.
 address the challenges of  increasing interest and participation  improving the preparation of girls in computing and cyber.
GIS EDUCATION OPPORTUNITY IN MINNESOTA National Science Foundation ATE  ISLET DUE #  ISLET2 DUE #   GeoTechCenter.
Addressing Teacher Dispositions at the community college Level
CREATING SHAREABLE SECURITY MODULES Kara Nance, University of Alaska Fairbanks, Fairbanks, AK, USA Blair Taylor, Towson University, Towson, MD, USA Ronald.
Security Injections Workshop – January 2010 Anne Arundel Community College Bowie State University Community College of Baltimore County Harford Community.
Spreading Curricular Change in PDC: Some Practical Tools This material is based on work supported by the National Science Foundation under Grant Nos. DUE / /
Integrating Data Analysis Across the Curriculum Feel free to edit and change this slide.
Infusion of Civic Engagement Into the Curriculum School of Communication, Illinois State University Zompetti, J. P., Hunt, S. K., McDade, J. S., Asbury,
Building Security In: Injecting Security throughout the Undergraduate Curriculum Towson University and Bowie State University Partnered with Anne Arundel.
Key requirements Focused on student learning Inclusive Transformative Five year duration Strong assessment component.
ELIZABETH WARDLE DIRECTOR OF WRITING OUTREACH PROGRAMS DEPARTMENT OF WRITING & RHETORIC UNIVERSITY OF CENTRAL FLORIDA President’s Class Size Initiative—Composition.
Partner4CS Implementing needed strategies to reach the national CS10K goals for the state of Delaware.
The Conceptual Framework: What It Is and How It Works Linda Bradley, James Madison University Monica Minor, NCATE April 2008.
Expanding Communications on the New T 3 TLC Program.
Group A ( ISD, ESC, CBO) Group Report to General Session.
Building Security In January 2009 Workshop Harry Hochheiser, Building Security In: January 2009 Workshop Harry Hochheiser Towson.
Information Literacy: Process and Progress at Indiana University of Pennsylvania Walter Laude Media Librarian Indiana University of Pennsylvania
This work is supported by a National Science Foundation (NSF) collaboration between the Directorates for Education and Human Resources (EHR) and Geosciences.
Some “take-home” ideas Summer schools, scholarships exist (from various universities, and Redfern Photonics) to give students a taste of a possible career.
ACSS Adapting Curriculum for Student Success. GOALS To improve the quality of higher education for students with disabilities To improve the quality of.
CCSSE 2012 Findings for Southern Crescent Technical College.
InTeGrate-ing Geoscience Learning in Undergraduate Education Cathy Manduca, Sean Fox, Ellen Iverson, Carleton College; David Blockstein, NCSE; Tim Bralower,
Information Literacy Progression Standards: The Story So Far Jacqui DaCostaThe College of New Jersey Eleonora DubickiMonmouth University Gary SchmidtOcean.
Post University. INSTITUTION: Post University, Waterbury,CT NAMES of Team members: Dylan Clyne, Maura Bozeman and Randal Streck VISION – Our departmental.
Building Security In: Workshop – August 2009 Anne Arundel Community Bowie State University Community College of Baltimore County Harford Community College.
“STAR (Safe Transitions Across CaRe): A resident and faculty initiative to improve patient care across the healthcare continuum Nancy M. Denizard-Thompson,
Quantitative Literacy Across the Curriculum. Members of the QLAC Committee Beimnet Teclezghi – co-chair Laura Pannaman – co-chair Marilyn Ettinger John.
Using Weapons of Mass Collaboration to Implode Information Literacy into the Curriculum Jacqui Weetman DaCosta & Eleonora Dubicki.
1 Embracing Math Standards: Our Journey and Beyond 2008.
WSU Composition Program Orientation Overview Ellen Barton Director of Composition
Description of a Process for Enhancing Pre-service Programs to Better Prepare General Education Teachers to Teach Students with Disabilities 2016 CEEDAR.
“Cool” Cybersecurity Modules: No Grading Required!
Department of Computer and Information Sciences
Heidi Manning, Susan Larson and Bethany Leraas
Keywords: Engineering ethics, design education,
2016 CEEDAR Cross-State Convening
A five-year community effort to improve Earth literacy and build a workforce prepared to tackle environmental and resource issues InTeGrate supports integrated.
Pace Path to Success: Combining Academic and Real-World Experiences through Purposeful Planning and Mentoring. 9/18/2018.
ACM/IEEE-CS Computer Science Curriculum
A five-year community effort to improve geoscience literacy and build a workforce prepared to tackle environmental and resource issues InTeGrate supports.
Presentation transcript:

Building Security In: Injecting Security throughout the Undergraduate Computing Curriculum PROBLEM STATEMENT  Secure coding is more important than ever.  Security education is a crucial component in addressing the current Cybersecurity crisis.  Though universities have added security tracks and courses, the Computer Science (CS) community has been slow to incorporate secure coding in the entire curriculum.  Training the next generation of computing professionals to build secure software will require an emphasis on teaching computer security foundations, principles, and skills.  If students are to learn these skills (as opposed to insecure bad habits), security can no longer be an afterthought, but instead must be seamlessly integrated in undergraduate computing education, beginning with the first courses. OUR PROJECT Security Towson  Security Injection Modules  Early and Often  Introductory Courses – CS0, CS1, CS2, and Computer Literacy  Faculty Workshops  Security Checklists  Rigorous Assessment  Five Maryland institutions (2 universities and 3 community colleges)  National and International Outreach Participants: Blair Taylor (Towson University), Siddharth Kaza (TU), Claude Turner (Bowie State University), Shiva Azadegan (TU), Mike O’Leary (TU) OUTCOMES 1. Increase number of security aware students 2. Increase students’ security awareness 3. Increase students’ ability to apply secure coding principles 4. Increase faculty security awareness DATA AND MEASURMENT  Pre and Post Surveys  Applied Code Checks  Find + Identify + Mitigate  Faculty Surveys  Split sections RESULTS -1 Increased number of security aware students. 1,630 responses KEY FINDINGS  Our project increased number of security aware students across five institutions  Security injection modules significantly improved students’ security awareness  Modules lead to increase in students’ ability to apply secure coding principles  Our project reached faculty across 12 institutions  The collaborative model for module development is effective.  Security Injection Modules are reproducible RESULTS - 3  This project is supported by the National Science Foundation CCLI program DUE Table 1. Sample Survey questions from CS0, CS1, and CS2 General Security Awareness What are the possible consequences of insufficient computer security? Phishing is … The conversion of data into a ciphertext that cannot be easily understood by unauthorized people is known as … When developing secure systems, where does security fit in? Which of the following is an example of a strong password? How interested are you in security … Secure Coding Invalid input can come from the … Which of the following should your well-designed program do before processing user input? When developing secure systems, where does security fit in? Security Software and Software Security are the same thing (true/false) Integer overflow is caused by … Integer overflow occurs … Increased student ability to apply secure coding principles RESULTS -2 Increased students security awareness RESULTS - 4 Increase faculty security awareness  1,026 survey responses, 40+ sections, 5 institutions  Significant increase in all courses, CS0 and CS1  These results persisted across majors  384 survey responses, 4 institutions  Significant increase in all modules in comp. lit.  These results persisted across gender and ethnicity  In four sections of CS0 and CS1 students using the modules are significantly better at Finding, Identifying, and Mitigating vulnerabilities STUDENT AWARENESS SURVEY SECURITY INJECTION MODULES Institutions12 Workshop Attendees135+ Participating faculty38 (integrated and control)