Presentation is loading. Please wait.

Presentation is loading. Please wait.

Outline Unique Challenges to Cybersecurity Education

Similar presentations


Presentation on theme: "Outline Unique Challenges to Cybersecurity Education"— Presentation transcript:

0 Broadening the Path to the STEM Profession through Cybersecurity Learning - Another Perspective
Xiangyang Li Johns Hopkins University Information Security Institute (JHUISI) Cybersecurity+ Liberal Arts Workshop, June 1-2, 2017, Charleston

1 Outline Unique Challenges to Cybersecurity Education
Offering Rounded Cybersecurity Education Chasing Talents in Liberal Arts Majors Our Approach and Solutions Designing Broad Educational Paths Developing Experiential Learning Modules Developing General Education Modules Developing Educational Materials Experimenting Topics June 1-2, 2017

2 Gaps in Raising Cybersecurity Talents
Quantity Well-documented shortage numbers Quality and Diversity Technical Proficiency Ethical, Privacy, Legal, Political, Management, etc. Human Aspects Cyber physical systems and IoT NSF SaTC Program Human Aspects – digital hygiene of common citizens to assistance to security engineers June 1-2, 2017

3 Efforts NSA/DHS Center for Academic Excellence in Information Assurance Different Cybersecurity Educational Programs and Tracks Different Courses June 1-2, 2017

4 Master of Science in Security Informatics (MSSI) at Hopkins
Technology & Research Track 5 Technology : at least 4 Core courses and 1 Cryptography; 3 Core Policy/Health/Management: at least 1 Policy and 1 management; Two additional courses; One Capstone Project. Policy & Management Track 3 Technology: at least 2 Core courses and 1 Cryptography; 5 Core/Foundational Policy/Health/Management: at least one from each category; Two additional courses; One Capstone Project. June 1-2, 2017

5 MSSI Technology Courses
EN Modern Cryptography EN Security and Privacy in Computing EN Advanced Topics in Cryptography EN Advanced Topics in Computer Security EN Introduction to Information Security EN Critical Infrastructure Protection EN Network Security EN Ethical Hacking EN Embedded Computer Systems - Vulnerabilities, Intrusions, and Protection EN /EN Practical Cryptographic Systems EN Computer Forensics EN Introduction to Cryptography EN Software Vulnerability Analysis EN Human Factors in Information Security EN Cloud Computing Security EN Cryptography and Coding EN Security Analytics EN Computer Intrusion Detection EN Advanced Network Security EN Advanced Computer Forensics 5 crypto courses 4 basics/advanced course sequences 650- JHUISI; 600- CS; and other departments June 1-2, 2017

6 MSSI Non-Technology Courses
Core Policy EN Rights in the Digital Age EN Moral and Legal Foundations of Privacy EN Global Cybersecurity EN Law and the Internet Core Management EN Financial Issues in Managing a Secure Operation EN Implementing Effective Information & Security Programs Foundational Management EN Writing Articles and Technical Reports EN Improving Presentation Skills for Scientists and Engineers EN Managing People and Resolving Conflict EN Project Management EN Leading Change EN Leading and Managing Teams in Virtual, Local and Global Settings EN Fundamentals of Management Core Health AS Intro to Health Policy and Management ME Health Information Systems: Design to Deployment ME Health Sciences Informatics: Knowledge Engineering and Decision Support ME Introduction to Biomedical and Public Health Informatics ME Real Time Disease Surveillance 5 crypto courses 4 basics/advanced course sequences June 1-2, 2017

7 CMU CyLab/INI/Management
Notes: Interdisciplinary programs Modularized program of study Accessed on 8/5/2014 June 1-2, 2017

8 CMU MSISTM and MSISPM MSISTM at Information Networking Institute (INI)
3 semesters; 12 courses, 144 units; 1 required policy/management course (2 modules); up to 4 possible; Options of project, practicum, or courses (3 courses); Cyber Forensics and Incident Response track. MSISPM at Heinz College (Management and IS) 4 semesters; 16 courses, 192 units; Mostly policy/management; several having light technical flavor; 1 required project or thesis (2 courses); 25 cohorts. June 1-2, 2017

9 Challenges to Research Universities
Engineering and other majors are very specialized. Actually hard for them to work together. Cybersecurity programs such as MSSI cannot find enough students With diverse background US domestic Where is the help? Look externally June 1-2, 2017

10 But How? June 1-2, 2017

11 Student Research Project (Note: MSSI Students in Fall 2016)
Team Student Members Mentor Other Personnel Title 1 Payal Gupta, Kaustubh Sarkar, Rahanik Vora Coffman, Joel Cyber Resiliency through Diversity: Evaluating Software Diversity 2 Zhenyu Liu, Bohan Li, Hana Aljarwan Cloud-Based Distribution for Diversified Software 3 Rono Dasgupta, Aditya Patil, Gijs Van Laer Green, Matt Harden Zero Knowledge Password Proofs Against Offline Dictionary Attacks 4 Moriyike Mejabi, Srishti Bhargava Kociemba, Mike Maria Vachino (DHS/APL) Feasibility, Security and Privacy Analysis of Bluetooth Low Energy (BLE) Beacon Technology in Improving Location and Proximity User Experiences 5 Jiazhen Fan, Qingying Hao, Jiaqin Zhou Leschke, Timothy Data Visualization of Windows Security Logs 6 Supriya Muthal, Yuan Huang, Sen Li Li, Xiangyang Nathan Bos (APL) A Cognitive Solution to Study Human Behavior towards Making Informed Security Decisions 7 Chen Cao, Xiao Chong Chua Luo, Song David Silberberg (APL) Malware Detection through Data Analytics 8 Asmaa Aljohani, Yue Zhu, Gyan Namdhari Nielson, Seth Identity-Enabled Transactions Based on the EMVCo Payment Tokenization Specification 9 Jingmiao Wang, Yuanqi Zhu, Harshneel More Darren Lacey (JHU) Detecting XSS attacks using BRO IDS 10 Kevin Manzotti, Kashif Memon, Rahul Durgad David Minch (APL) Replication of CryptoDrop - Ransomware Detection 11 Rahul Nair, Chinmohan Nayak Watkins, Lanier Industrial Control System Inference-Based Intrusion Detection System (ICS-iBiDS) 12 Ren Hao David Stone (Lenovo) Application Level Risk Scoring Framework Based on CWSS 13 Jessica Vallejo, Juan Ramos, Gaetano Snow Penetration Testing of WiFi Controlled UAV June 1-2, 2017

12 Standalone Module Type Topics PUI/LIA Curriculum Legal issues in CySec Case study, essay, discussion HIPPA/FERPA, Computer Security Act, Laws and Authorities, US Patriot Act Political Science International Studies Social Science Management Strategic Plan and Management, Business Continuity / Disaster Recovery Economics Leadership Social Science Human Factors Case study, essay, discussion, hands on exercise Privacy, Passwords, Usable Security Humanities Social Science Attacks and Defense GENI experiment IDS, Traffic, Log Analysis, performance Technology Cryptography Hands on exercise Cryptograms, ciphers, encryption, decryption Network components and traffic Traffic and performance analysis, protocol introduction

13 Political Science Module
Lecture slides on cyber warfare and international conflicts Case study assignment Ukraine power grid attack Role play and analysis June 1-2, 2017

14 Finance Module Module design Lecture slides
financial investment basics cybersecurity investment specific materials Case study on Target breach There are other resources! Gordon-Loeb Cybersecurity Investment Model June 1-2, 2017

15 Questions? June 1-2, 2017


Download ppt "Outline Unique Challenges to Cybersecurity Education"

Similar presentations


Ads by Google