Presentation is loading. Please wait.

Presentation is loading. Please wait.

Larry Howard Sr. Research Scientist Eric Imsand 1, Larry Howard 2, Ken Pence 2, Mike Byers 3, Dipankar Dasgupta.

Similar presentations


Presentation on theme: "Larry Howard Sr. Research Scientist Eric Imsand 1, Larry Howard 2, Ken Pence 2, Mike Byers 3, Dipankar Dasgupta."— Presentation transcript:

1 Larry Howard Sr. Research Scientist larry.howard@vanderbilt.edu www.prototus.org Eric Imsand 1, Larry Howard 2, Ken Pence 2, Mike Byers 3, Dipankar Dasgupta 1 Center for Information Assurance University of Memphis Institute for Software Integrated Systems Vanderbilt University SPARTA, Inc. Huntsville, AL 123

2 “…remotely exploitable vulnerabilities have been increasing since the year 2000 and reached 89.4% of vulnerabilities reported in 2007.”  Source: “IBM Internet Security Systems X-Force 2007 Trend Statistics” “In 2007, Google uncovered more than three million malicious Web addresses (URLs) that initiate drive-by downloads.”  Source: N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu, “The Ghost In The Browser – Analysis of Web-based Malware” TRUST Autumn Conference 2008

3 Source: Stefan Frei, Thomas Duebendorfer, Gunter Ollmann, Martin May, ‘Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the “insecurity iceberg”’

4 “Long game” – More trustworthy technologies – Fail-safe deployment models “Short game” – Increase awareness of threats among users – Make training on responses more readily available and valuable TRUST Autumn Conference 2008

5 Fire Safety Training In the event of fire, move quickly to the nearest exit, avoiding elevators. Fire Safety Training In the event of fire, move quickly to the nearest exit, avoiding elevators. In the event of fire, you should a)Put out the fire b)Find the nearest elevator c)Move quickly to the nearest exit d)None of the above In the event of fire, you should a)Put out the fire b)Find the nearest elevator c)Move quickly to the nearest exit d)None of the above Next Hmm. a? Hmm. a?

6 TRUST Autumn Conference 2008 Thanks for using the Online Training System This morning you have completed the following training: Sexual Harassment Fire Safety Neurosurgery Thanks for using the Online Training System This morning you have completed the following training: Sexual Harassment Fire Safety Neurosurgery Glad that’s over. What’s for lunch? Glad that’s over. What’s for lunch? Despite the potential to reach large numbers of users, most online training is currently perceived as a bad joke.

7 FEMA sponsored free online training – for IT professionals, risk managers, and general users University of Memphis Center for Information Assurance (CfIA) – with Vanderbilt University (ISIS) and SPARTA, Inc. TRUST Autumn Conference 2008 www.act-online.net

8 TRUST Autumn Conference 2008 Level/TrackTechnical (Track 1) General (Track 2) Business Continuity (Track 3) Beginner/IntroductoryInformation Security Basics (TEI: AWR-173-W) Information Security for Everyone (TEI: AWR-175-W) Business Information Continuity (TEI: AWR-176-W) IntermediateSecure Software and Network Assurance (In development) Cyber Ethics (TEI: AWR-174-W) Information Risk Management (Pending approval) AdvancedDigital Forensics (Q1-2009) Cyber Law and White Collar Crime (Q3-2009) Cyber Incident Analysis and Response (Q1-2009)

9 TRUST Autumn Conference 2008 ACT Online courses consist of modules anchored on authentic problem-solving situations with a common macro-structure.

10 TRUST Autumn Conference 2008 ACT Online learning resources can be freely explored by trainees to address the overarching challenge.

11 TRUST Autumn Conference 2008 Like the web, assisted search features of ACT Online help trainees use learning resources and self-assessments.

12 TRUST Autumn Conference 2008 ACT Online self-assessments enable trainees to confirm their understanding of resources with progressive feedback. Clarify the questionCriticize the responseProvide resource(s) 1 1 2 2 3 3

13 TRUST Autumn Conference 2008 ACT Online gives trainees credit for what they already know through pre-qualification, adapting the training in response.

14 Attackers increasingly target vulnerabilities widely distributed among user population Lack of awareness and response by computer users is a serious near-term problem Online training holds potential to reach large populations, but currently viewed as ineffective ACT Online is using modern instructional techniques and features to change perception Visit us today at www.act-online.netwww.act-online.net TRUST Autumn Conference 2008

15 ACT Online is supported by Cooperative Agreement Number 2006-GT-T6-K009 administered by the Federal Emergency Management Agency, National Preparedness Directorate, National Integration Center, Training and Exercise Integration. Points of view and opinions in this presentation are those of the author(s) and do not necessarily represent the position or policies of the United States Government. TRUST Autumn Conference 2008


Download ppt "Larry Howard Sr. Research Scientist Eric Imsand 1, Larry Howard 2, Ken Pence 2, Mike Byers 3, Dipankar Dasgupta."

Similar presentations


Ads by Google