Presentation is loading. Please wait.

Presentation is loading. Please wait.

Conference September, 2005 Career Pathways for Student Success The Increased Importance of Information Assurance Education National Tech Prep Network.

Similar presentations


Presentation on theme: "Conference September, 2005 Career Pathways for Student Success The Increased Importance of Information Assurance Education National Tech Prep Network."— Presentation transcript:

1 Conference September, 2005 Career Pathways for Student Success The Increased Importance of Information Assurance Education National Tech Prep Network

2 A Roadmap to a Career in Homeland Security Moderator: Phil Hale Dean of Applied Technology Oakland Community College

3 Information Assurance Directorate Dr. Vic Maconachy

4 Congress Speaks “We now live in a world where terrorists can do as much damage with a keyboard and a modem as with a gun or bomb…Two choices are available: adapt before the attack or afterward.” Sen. Edwards introducing Cybersecurity Research and Education Act of 2002 Sen. Edwards introducing Cybersecurity Research and Education Act of 2002

5 How Bad Is It ? Winning the battle is dependent on knowing the enemy’s secrets, movements and plans. Al Qaeda Manual: Declaration of Jihad Against the Country’s Tyrants, eleventh lesson: Espionage

6 Read Any Good News Lately? Internet Attacks During Third Quarter Tech Web News According to Internet Security Systems’ newest report, the number of security threats climbed 9 percent in the third quarter over the previous three months. CSI – Cyberterrorism: More Sophisticated Than Past Worms Information World No hard evidence exists that shows a cyberterrorism attack on the U.S., but when such an attack comes, it is likely to be much more harmful than the current crop of relatively unsophisticated viruses and worms that have caused billions of dollars in damages…

7 YES ! …Maybe ? 2003 IT Security Budgets Increased Despite Flat Overall Spending, Says META Group Business Wire This year, companies spent an average of 8.2% of their total IT budgets on security, up from 7.6% in 2002 and only 3.2% in 2001, according to new findings from META Group’s 2004 Worldwide IT Benchmark Report. Sobig’s Success Prompts Calls for Secure I D G News Service In the wake of the Sobig attack, security experts uniformly credited the worm’s sophisticated design for much of its success. However, the sheer magnitude of Sobig’s attack led to questions about whether the Internet’s current infrastructure is making things too easy for virus writers and spammers.

8 Talk about impact! A True Story USA TODAY – Monday Sept. 8, 2004 Betty bought a brand new computer for Christmas. In June, COMCAST curtailed her outbound mail privileges after pinpointing her PC as a major source of spam. An intruder had turned her P C into a “Zombie”, spreading as many as 70,000 pieces of spam a day.

9 Auctions. Search engines, Comparison shopping Creates spam relay Shopping On the net Download malicious Code/keystroke reader

10 Betty is not alone National Cyber Security Alliance Study with AOL:  Approximately three-fourths of users falsely believed their computers were at least somewhat safe from on-line threats and viruses, and 60% believed they were safe from hackers.  Two-thirds of the users had no firewall protection nor current anti-virus protection

11 TECHNOLOGY OPERATIONS PEOPLE Fundamentally, only THREE countermeasures available to protect critical information infrastructures. Defense-In-DepthDefense-In-Depth Information Assurance Triad

12 Finance FederalGovernment Industry Network Protection Is No Longer Just an Insurance Policy, It Is Now a Core Business Requirement Education

13 Growing the Information Assurance Work Force for Today and Tomorrow

14 Awareness, Literacy, Training and Education: Weave a thread of continuity through The National Plan I II III IV V National Response System Threat & Vulnerability Reduction Awareness and Training Secure Govt. International Cooperation Jan. 2003

15 The National Strategy to Secure Cyberspace Priority III : A National Cyberspace Awareness and Training ProgramPriority III : A National Cyberspace Awareness and Training Program In addition to the vulnerabilities in existing information technology systems there are at least two other major barriers to users and managers acting to improve Cybersecurity In addition to the vulnerabilities in existing information technology systems there are at least two other major barriers to users and managers acting to improve Cybersecurity (1) a lack of familiarity,knowledge and understanding of the issues(1) a lack of familiarity,knowledge and understanding of the issues (2) an inability to find sufficient numbers of adequately trained and/or appropriately certified personnel to create and manage secure systems.(2) an inability to find sufficient numbers of adequately trained and/or appropriately certified personnel to create and manage secure systems.

16 CNSS National Training Standards Map 127 U.S. Institutions in 40 States and the District of Columbia Map to the CNSS National Training Standards CNSS National I A Education and Training Standards: CNSSI 4011The I A Professional CNSSI 4012Senior Systems Manager CNSSI 4013Systems Administrator CNSSI 4014Information System Security Officer CNSSI 4015System Certifier CNSSI 4016Risk Analyst (Pending) CNSSI 4017 Information Systems Security Engineer (in development)

17 CNSS National Training Standards Map This program offers tremendous opportunity for 2 year programs/

18 National Centers of Academic Excellence in Information Assurance Education Partnerships with Academia Reducing the vulnerability of our National Information Infrastructure by promoting higher education in information assurance and producing a growing number of professionals with IA expertise in various disciplines.

19 Centers of Academic Excellence in Information Assurance Education

20 2004 New National Centers of Academic Excellence in Information Assurance Education

21

22 2005 New National Centers of Academic Excellence in Information Assurance Education California State Polytechnic (CA) DePaul University (IL) East Carolina University (NC) Eastern Michigan University (MI) Nova Southeastern University (FL) Oklahoma State University (OK) United States Air Force Academy (CO) Virginia Polytechnic Institute and State University (VA)

23 Partnershipfor Critical Infrastructure Security NSA-Designated Centers of Academic Excellence in Information Assurance Education Geo location is very good Geo location is very good.

24 IMPACT Schools designated as CAEs  are eligible for special congressional funding  are reporting students specifically searching for schools with CAE recognition  are starting to support and receive support for state level cyber and homeland security issues and research  are producing students immediately employed in the work force Areas having CAEs Can boast having IA education and training and education programs to potential corporations considering relocation Can boast presence of IA research capability Can use CAEs to improve security posture

25 Congress Passes Cyber-Service Bill (October 20, 2000) Provides for: –Scholarships for Service –Infrastructure Support: Faculty Development –Infrastructure Support: Program Development –All based on NSA Centers of Academic Excellence in Information Assurance Provides for: –Scholarships for Service –Infrastructure Support: Faculty Development –Infrastructure Support: Program Development –All based on NSA Centers of Academic Excellence in Information Assurance Administered by National Science Foundation NSA representative co-chair of executive steering group Implementing - Defending America’s Cyberspace National Plan for Information Systems Protection Version 1.0 An Invitation to a Dialogue The White House 2000 The White House 2000

26 NSA Designated Executive Agent Assistant Secretary of Defense Command, Control, Communications and Intelligence MEMO Dated July 2, 2001 Assistant Secretary of Defense Command, Control, Communications and Intelligence MEMO Dated July 2, 2001 “I hereby delegate to the Director, National Security Agency, the authorities and responsibilities of the Secretary of Defense under the following statute: Public Law ” “I hereby delegate to the Director, National Security Agency, the authorities and responsibilities of the Secretary of Defense under the following statute: Public Law ” Department of Defense Scholarship for Service Program

27 BREAKOUT OF STUDENTS

28 National Colloquium for Information Systems Security Education National Colloquium for Information Systems Security Education Purpose: Academic colloquium with academia, government, business and industry INFOSEC experts to discuss direction of INFOSEC undergraduate and graduate curricula; academic disciplines; common requirements; specific knowledge, skills and abilities; certification requirements and feasibility of certification board formulation. Partnerships with Business, Academia, & Government Conference: June, 2006 Maryland Maryland

29 Sources of Help & Information The Twenty Most Critical Internet Security Vulnerabilities (Updated) ~ The Experts’ Consensus Non-Government

30 NIATEC Academia Sources of Help & Information

31 PURPOSE: Enhance AwarenessEnhance Awareness Encourage Information Systems Education and TrainingEncourage Information Systems Education and Training CD-ROMSCD-ROMS VIDEO’SVIDEO’S BROCHURESBROCHURES BOOKLETSBOOKLETS Self-Help Awareness Program WHERE CAN I FIND INFORMATION ON DEVELOPING AN AWARENESS PROGRAM? Awareness Toolkit

32 Educational Solutions for a Safer World National Security Agency Information Assurance Directorate

33 Jenny Griffith CIS Secondary Tech Prep Liaison Walled Lake Central High School

34 Beginning the Educational Path Building a model for a career focused on Information Assurance education and training through High School curricula

35 28 local school districts 44 high schools four technical campuses business/industry/labor affiliates five campuses of Oakland Community College Oakland Schools, the intermediate school district of Oakland County. 28 local school districts 44 high schools four technical campuses business/industry/labor affiliates five campuses of Oakland Community College Oakland Schools, the intermediate school district of Oakland County. The Oakland County Tech Prep Consortium is comprised of:

36 An Overview of Oakland County, Michigan Geography: Located north of Detroit; 910 square miles. The county has 450 lakes within its boundaries. Population: 1,134,195. For the year 2000, the estimated median age of the county was 36.7 years. Median Income: The median income per household based upon 1999, which is the latest data, is $61,907 (U.S. average = $41,994). Commerce: Forty-five Fortune 500 companies do business in the County. It is the third wealthiest county in the nation. One- third of all U.S. auto production takes place within 70 miles of the County. Robotics firms in Oakland County account for more than 50% of all U.S. robotics sales. Geography: Located north of Detroit; 910 square miles. The county has 450 lakes within its boundaries. Population: 1,134,195. For the year 2000, the estimated median age of the county was 36.7 years. Median Income: The median income per household based upon 1999, which is the latest data, is $61,907 (U.S. average = $41,994). Commerce: Forty-five Fortune 500 companies do business in the County. It is the third wealthiest county in the nation. One- third of all U.S. auto production takes place within 70 miles of the County. Robotics firms in Oakland County account for more than 50% of all U.S. robotics sales.

37 Step one in “the process” Agreeing upon specific measurable competencies which fulfilled requirements of degree and certificate programs at Oakland Community College

38 Competencies

39 Poster

40 Careercruising.com

41 Government Sources of Help & Information


Download ppt "Conference September, 2005 Career Pathways for Student Success The Increased Importance of Information Assurance Education National Tech Prep Network."

Similar presentations


Ads by Google