Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Education & Research

Similar presentations


Presentation on theme: "Cyber Education & Research"— Presentation transcript:

1 Cyber Education & Research
The State of Cyber Security in San Antonio Dr. Dave Dampier Professor and Chair, Department of Information Systems and Cyber Security

2 Cyber Security Education Programs in San Antonio
UTSA BBA in Cyber Security (Residential and Online) BS in Computer Science w/Cyber Operations Concentration MS and PhD degrees in IT, CS, and CPE Various minors and certificate programs Texas A&M San Antonio BBA in Computer Information Systems w/Cyber Emphasis Hallmark University B.S. in Cyber Security Our Lady of the Lake University B.S. in Computer Information Systems and Security BBA in Computer Information Systems w/emphasis in Security

3 UTSA Cyber Security Impact
Certification & Recognition #1 ranked cyber security program in the nation (Ponemon, 2014) #2 ranked graduate program in the nation (universities.com, 2016) NSA/DHS designated Center of Academic Excellence in Information Assurance and Cyber Defense CAE in IA/CD Education (since 2002, recertified in 2014) BBA in Cyber Security, MSIT w/Cyber Concentration CAE in IA/CD Research (since 2008, recertified in 2014) PhD in IT w/Cyber Concentration Digital Forensics focus area designation in 2014 CAE in Cyber Operations (2018) BS in Computer Science w/Cyber Operations Concentration

4 Academic Programs in Cyber Security
College of Business BBA Major/Minor in Cyber Security (enrollment ~1300) Online option (~160) Undergrad Minor in Digital Forensics* (enrollment ~200) Grad Concentration in Cyber Security, MS/PhD in Info Technology (~120/~20) College of Science Undergrad & Graduate Concentrations in Computer & Information Security, BS/MS in Computer Science (BS ~75/1293; MS ~9/76) Concentration in Cyber Operations Several cyber security Ph.D. dissertations College of Engineering Undergrad & Graduate Courses in Cyber Security, Department of Computer & Electrical Engineering Multi-disciplinary Programs Pathogenic Outbreak Investigations Certificate Program

5 Bio-Inspired Cyber Defense Cyber-Inspired Bio Defense
Cross Disciplinary Pathogenic Outbreak Investigations Research & Education Digital Forensics Biological Defense Propagation Trajectory Rate Method Polymorphism Attribution Strain/Family Classification Infection Vector Threats Malware Botnets Threats Food pathogens Water pathogens Biological pathogens Analysis Characteristics Behavioral Timing Detection Infection Symptoms In-transit Signatures Machine Learning Prediction of Isolates Sponsorship: DHS-14-ST

6 Sampling of cyber security courses
Information Assurance Incident response and Intrusion Detection Digital forensics Secure network design Secure e-commerce Secure s/w development Secure network ops Unix/Linux security Cryptography Attack & defend Cyber physical systems Malware analysis Reverse engineering Network security Cyber law Cyber security policy Risk assessment Security best practices Cyber Operations

7 World Class Online Cybersecurity Education
Remote virtual lab capability Experiential learning Scalability 24/7 remote access Modular curriculum Each course is developed in approximately one week long modules Modules are somewhat self-contained: lab and quiz per module. Cross-disciplinary Interdisciplinary core & capstone Mixture of majors in modules

8 Extracurricular Activities
Computer Security Association (CSA) Over 100 active student members Cross-disciplinary (CyS, CS, ECE, etc.) Extremely active Weekly meetings Training sessions Industry speakers Capture the flag exercises Frequent, successful participation in cyber competitions (CCDC, CPTC, NCAC, Panoply, CSAW CTF, MITRE CTF…)

9 Awards won by Cyber Security Association

10 Cyber Security Research
Two classes of research… Traditional business focus (“organizations & people”) Applied technical (“information systems”) Business & organizational focused security research Psychological/behavioral info security Privacy issues, user behavior impacting security Economics of info security Economic causes & consequences, incentives Info security management & strategy Investment decisions, novel defensive strategies

11 Cyber Security Research (cont.)
Technical, applied research (R&D Phase 6.2/6.3) Digital forensics Identification & acquisition of forensic artifacts Insider threat detection Advanced indication & warning; behavioral & technical indicators Cyber physical systems Secure architecture design; vulnerability assessments; privacy Cloud, Mobile and IoT Vulnerability analysis & exploitation; defensive tactics & strategies Applied network & info systems security Malware phylogeny & threat assessment; network attack characterization

12 Cyber Physical Systems Security
Threat modeling for root cause analysis (malicious vs. non-malicious failure) Smart grid security and attack resiliency (forensics driven approach) Design algorithms to detect opportunistic attacks, false data injection attacks, etc, in smart grid cyber-physical systems Protection against GPS spoofing in CPS & smart grids Post-quantum era smart grid security & attack resiliency (detection, mitigation, secure communications) Cyber physical system data privacy & secure communication Other research: - Secure dynamic state estimation methods for systems under attack & with unknown inputs - Risk mitigation under attack & unknown inputs

13 Industrial Control Systems Laboratory

14 Research on the Horizon
Cyber physical system threat modeling Semi-autonomous network risk characterization Other dimensions of malware threat metric Cyber risk / governance analytics Robust analytics for reliable self-assessments of risk NIST Framework for Improving Cybersecurity Infrastructure Data analytics as a service protocols / processes Dynamic, customized security education, training, and awareness (SETA)

15 Comments / Questions ? david.dampier@utsa.edu (662) 312-8370 (Cell)
(210) (Work) Comments / Questions ?


Download ppt "Cyber Education & Research"

Similar presentations


Ads by Google