Download presentation
Presentation is loading. Please wait.
1
Cybersecurity + Liberal Arts Workshop
Xenia Mountrouidou (Dr. X)
2
Outline Motivation Cybersecurity & Liberal Arts Cyber Paths
GENI
3
Motivation: Cybersecurity Education Challenges
Cybersecurity: fast paced, changing field Predominantly undergraduate institutions have limited resources Experiential learning in cybersecurity requires large investments
4
Cybersecurity Education: Solutions
General education can feed diverse cohorts to the cybersecurity profession Cloud computing infrastructures can be instrumental
5
Broadening the Path to the STEM Profession through Cybersecurity Learning
6
Cybersecurity Paths General education – Discover
Intro to cybersecurity – Understand Cybersecurity courses & capstone – Apply
7
Liberal Arts Education: Gen Ed
Definition: a program of education (as in some liberal-arts colleges and secondary schools) intended to develop students as personalities rather than trained specialists and to transmit a common cultural heritage — compare liberal education.
8
General Education & Cybersecurity
Aesthetic and interpretive understanding; Hacker = Aesthete (Brian Harvey, UC Berkley), CofC Culture and belief Empirical reasoning; Security Assessment, Pen Test Ethical reasoning; Ethics vs Aesthetics Science of living systems; Science of the physical universe; Societies of the world; and The United States in the world. ``computer hacker,'' is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything.
9
Cybersecurity & Liberal Arts
10
Standalone Module Type Topics PUI/LIA Curriculum Legal issues in CySec Case study, essay, discussion HIPPA/FERPA, Computer Security Act, Laws and Authorities, US Patriot Act Political Science International Studies Social Science Management Strategic Plan and Management, Business Continuity / Disaster Recovery Economics Leadership Social Science Human Factors Case study, essay, discussion, hands on exercise Privacy, Passwords, Usable Security Humanities Social Science Attacks and Defense GENI experiment IDS, Traffic, Log Analysis, performance Technology Cryptography Hands on exercise Cryptograms, ciphers, encryption, decryption Network components and traffic Traffic and performance analysis, protocol introduction
11
CofC Gen Ed FYE: First Year Experience Writing Foreign Language
History Humanities Mathematics & Logic Natural Science Social Sciences
12
FYE: First Year Experience – Chasing Ghosts in the Wires
Basic Command Line Cyber Defense Cyber Threats Fundamental Security Design Principles Intro to Cryptography IA Fundamentals IT System Components
13
Denial of Service Lab for non-CS Majors
Pre-installed topology ping - verification Iperf - performance Hping3 - DoS Hypothesis testing Experiments on GENI GENI: Virtual laboratory for networking and distributed systems research and education
14
What is GENI? (a sneak preview)
Obtain compute resources from locations around the United States; Connect compute resources using Layer 2 networks in topologies best suited to their experiments; Install custom software or even custom operating systems on these compute resources; Control how network switches in their experiment handle traffic flows; Run their own Layer 3 and above protocols by installing protocol software in their compute resources and by providing flow controllers for their switches.
15
GENI and Gen Ed Wofford College of Charleston
Computational Science Gen Ed 15 students Mandatory for Lab requirement College of Charleston FYE 20 students Mandatory for first year students gen ed
16
Pilot Survey Conducted at Wofford College. Cohort:
15 students – 2 computer science declared majors Self-assessment of CS knowledge: 40% novice; 40% intermediate; 20% advanced Pilot Questionnaire: I have a better understanding of CS. I understand how information is transmitted through the internet. I understand the basics of computer attacks and computer network attacks. I understand how computer and network attacks can harm me and my organization. I am considering to take another CS course.
17
Results
18
Comments Q: What did you like best about the GENI lab and why? I liked the opportunity to take part in a live experiment with real computers. Doing to the denial of service attack was really cool. I liked that we did a real world issue in a safe and controlled environment. Working with terminal and the command line It was cool to see how flooding a computer actually works rather than it just happens. I liked how we were able to simulate a real attack. This really puts it into prospective on how hackers can do this to anyone.
19
Comments Q: What did you like least about the GENI lab.
I did not like how repetitive it was, and how some things took a very long time to do. I think that my least favorite thing about GENI was trying to get GENI to work. The GENI infrastructure seemed to be unstable and difficult to work with at times. It's also hard to have a complete understanding of how to perform the lab without already having an understanding in computer science.
20
Preliminary results - FYE Lab
20 students – 6 computer science declared majors Pre & Post Survey Demographic questions Perception Class Focus Group – 4 students
21
Preliminary Results
22
Cybersecurity courses & GENI
Intrusion Detection Systems Digital Certificate Advanced topics
23
Intrusion Detection Systems and Mitigation
Goals: Install Snort IDS on monitor machine Duplicate all traffic to monitor Create a custom alert for Snort IDS Use mitigation script Drop malicious traffic Send Spoofed SYN Send SYN-ACK Resend SYN-ACK Attacker Server Spoofed Client
24
Digital Certificate Create a certificate authority
Validate & revoke certificate Understand OpenSSL
25
Advanced Topics Covert Channel Communication
Manipulate TCP flags to send exfiltrated passwords Analyze traffic using information theory Software Defined Networking (SDN) solutions for security Use SDN flow tables to identify attacker Use network programmability to drop malicious traffic
26
Conclusions With cybersecurity in liberal arts we produce better citizens in our graduates Cybersecurity labs + cloud infrastructure = experiential learning with low overhead Cybersecurity belongs to the liberal arts
27
Questions? Thank you!
28
Please take the survey to help us improve this workshop
goo.gl/i6787a
29
appendix
30
Paths to Cybersecurity Education
Cohort A CySec Module Cohort B CySec Course Cohort C.1 CySec Capstone Cohort C.2 CS Major or CS Minor
31
Political Science General Education Module
International Conflict Stuxnet Denial of Service International Conflict Stuxnet Denial of Service as a weapon Goals: Gain an appreciation about attacks and cyberwar Research about international laws and policies
32
Finance General Education Module
Gordon Loeb Model
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.