Download presentation
Presentation is loading. Please wait.
Published byJulius Glenn Modified over 9 years ago
1
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012 ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security
2
Cyber technologies and systems have evolved Cyber security goals have evolved Computer security Information security = Computer security + Communications security Information assurance Mission assurance Cyber security research and practice are loosing ground © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Cyber Security Status
3
3 World-Leading Research with Real-World Impact! Graduate Cyber Security Education Tech- Light Tech- Heavy Tech- Medium
4
Cyber Security as a Discipline © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Computer Science and Engineering Cyber Security
5
Cyber Security as a Discipline © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Computer Science and Engineering Cyber Security
6
Too much material to teach Growing faster than teachers can keep up Computer science theory Computer system principles and practice Cyber security theory Cyber security system principles and practice Statistics, sociology, organizational theory, economics, psychology, game theory …. Laws, regulations, compliance …. Privacy …. History, successes and failures ….. © Ravi Sandhu 6 World-Leading Research with Real-World Impact! Fundamental Challenge I The packaging challenge
7
Immature field What is fundamental to cyber security? Where are the boundaries of a cyber system? What are the goals of cyber security? © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Fundamental Challenge II The discipline challenge
8
Enable system designers and operators to say: This system is secure © Ravi Sandhu 8 World-Leading Research with Real-World Impact! Cyber Security Goal
9
Enable system designers and operators to say: This system is secure There is an infinite supply of attacks © Ravi Sandhu 9 World-Leading Research with Real-World Impact! Cyber Security Goal Not attainable
10
Enable system designers and operators to say: This system is secure enough © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Cyber Security Goal Many successful examples
11
The ATM (Automatic Teller Machine) system is secure enough global in scope Not attainable via current cyber security science, engineering, doctrine not studied as a success story Similar paradoxes apply to on-line banking e-commerce payments © Ravi Sandhu 11 World-Leading Research with Real-World Impact! The ATM Paradox
12
Enable system designers and operators to say: This system is secure enough In an innovative ecosystem the innovation drive will ensure that the bar for enough will be fairly low © Ravi Sandhu 12 World-Leading Research with Real-World Impact! Cyber Security Goal
13
Productivity-Security Cyber Security is all about tradeoffs © Ravi Sandhu 13 World-Leading Research with Real-World Impact! ProductivitySecurity Let’s build it Cash out the benefits Next generation can secure it Let’s not build it Let’s bake in super-security to make it unusable/unaffordable Let’s sell unproven solutions There is a middle ground We don’t know how to predictably find it
14
Develop a scientific discipline to predictably find the sweet spots for different application and mission contexts to predictably find, incentivize and deploy microsec that leads to desirable macrosec outcomes that can be meaningfully taught in Universities at all levels: BS, MS, PhD Prognosis we shall succeed (we have no choice) but we need to change to succeed © Ravi Sandhu 14 World-Leading Research with Real-World Impact! Grand Challenges
15
15 ICS Projects Secure information sharing Social network security Secure data provenance Attribute based access control Botnet and malware analysis Smart grid security Hardware security Future internet © Ravi Sandhu World-Leading Research with Real-World Impact!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.