Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall 2012. Education: Ph.D. in Computer Science at State University of.

Slides:



Advertisements
Similar presentations
Presented by: Jerry Legge Associate Provost for Academic Planning (Interim), and Professor of Public Administration and Policy (SPIA) Provost Advisory.
Advertisements

Joint CASC/CCI Workshop Report Strategic and Tactical Recommendations EDUCAUSE Campus Cyberinfrastructure Working Group Coalition for Academic Scientific.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
SCHOOL OF HEALTH RELATED PROFESSIONS STRATEGIC PLAN 2003 DRAFT.
Cyber Education Project Accreditation Committee November 2014.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
NTUST National Taiwan University of Science and Technology 2009 School of Management.
1 Exploring NSF Funding Opportunities in DUE Tim Fossum Division of Undergraduate Education Vermont EPSCoR NSF Research Day May 6, 2008.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
College Strategic Plan by
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
Prof Dr PE Seeram Ramakrishna, FREng National University of Singapore Co-Founder, University Excellence Care Project ( Session 4: Strategies.
Finding the Right LINCS Beth Fredrick, Center for Literacy Studies
David L. Spooner1 IT Education: An Interdisciplinary Approach David L. Spooner Rensselaer Polytechnic Institute.
Overview and Recommendations for Academic Renewal Department of Human Development and Psychoeducational Sciences.
1 Provost’s Report to the Board of Trustees The Pennsylvania State University Strategic Plan: through PRESENTED BY Nicholas P. Jones,
1 Promoting Technology and Applied Sciences in Cyprus Elpida Keravnou-Papailiou President of Governing Board Cyprus University of Technology.
Welcome to the Anthropocene. We are approaching a state-shift in Earth’s biosphere Where human activities will impact >50% of the physical & biological.
FACULTY OF ELECTRICAL ENGINEERING DEPT. OF TELECOMMUNICATION ENGINEERING CZECH TECHNICAL UNIVERSITY IN PRAGUE ITU Centre of the Czech Technical.
EIT ICT Labs  ICT innovation is driving transformations in society to improve quality of life  Rapid disruptive ICT innovation is a key driver in the.
US Corporate Research Center (USCRC). © ABB USCRC 2 Strengthening Research in U.S. US Corporate Research - A branch of ABB’s Global R&D Labs  Raleigh.
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
Information Technology
May 7, 2012 | 9:00 – 9:30 am | Wasserstein Hall Ivy Plus Opening Remarks.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Side 1 Can Computer Supported Collaborative Learning help to fulfil the VirClass goal? Grete Oline Hole, HiB.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Library as Partner in Creating Curriculum for Sustainability Bonnie J. Smith University of Florida Libraries Maria A. Jankowska UCLA Research Library.
University Development Office. Questions What is the mission of a University development office? What are the prerequisites for a successful development.
IEEE - Educational Activities Board (EAB) Overview Dr. Ferial El-Hawary, P.Eng., FIEEE,FMTS,FEIC IEEE Canada (R-7), Past Director
Information Technology Lonnie Bentley, Professor and Head Department of Computer Technology (CPT) - and - H. E. (Buster) Dunsmore, Professor Department.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Practices of Mainframe Education in Tongji University Dr. Gene Fuh Guest Professor of TongJi University
Department of Computer and Information SciencesMay 5th, 2004 HOMMER: Holistic Model for Minority Education & Research.
The UWF Strategic Planning Facilitators Robert Dugan, Jim Hurd, Kyle Marrero, Dottie Minear, Stacie Whinnery, and Josh Finley The University of West Florida.
Center for Cybersecurity Research and Education (CCRE)
GOAL: Connect the value of a growing IT talent pipeline to the development of smarter communities. Lonnie Emard Executive Director, CESM.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
The ASA Mission Promote the practice and profession of statistics Support excellence in statistical practice, research, journal, and meetings Improve statistical.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Building the Future Cisco Networking Academy Program.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Forum on Internet of Things: Empowering the New Urban Agenda Geneva, Switzerland, 19 October 2015 Cooperation and Opportunities for Standards in the New.
1 © ACADEMY OF FINLAND Academy of Finland 2012: Research knows no boundaries Tiina Kotti PhD, Programme Manager, Programme Unit.
New A.M. Best Cyber Questionnaire
Promoting Research and Education of IA & CyberSecurity Gordon W. Romney Ph.D Professor and Senior Research Scientist School of Engineering and Technology.
Course, Curriculum, and Laboratory Improvement (CCLI) Transforming Undergraduate Education in Science, Technology, Engineering and Mathematics PROGRAM.
1 HIGHER EDUCATION PROGRAMS AT NASA K. E. BLANDING, PH.D. Acting Director, Higher Education Division NASA Office of Education.
Government of Nepal Ministry of Education National Center for Educational Development.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Goals 1.Ensure adequate supply of computing professionals 2.Achieve broader participation in the field Integrative Computing Education and Research: Preparing.
University of Computer Studies, Yangon Myanmar AUNG HTEIN MAW Lecturer ICT faculty member
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Faculty of Applied Science and Technology /Applied Computing INDUSTRY AND EDUCATION A PRACTIONER’S VIEW OF INDUSTRY / RESEARCH DRIVEN.
Science & Technology for National Progress in African Region: Highlights of Regional Strategy and Action Professor Gabriel B. Ogunmola, FAS President,
Department of Mathematics and Computer Science
UTPA 2012: A STRATEGIC PLAN FOR THE UNIVERSITY OF TEXAS-PAN AMERICAN Approved by President Cárdenas November 21, 2005 Goals reordered January 31, 2006.
1 GOAL: Provide students with a quality educational experience that enables them to complete their educational goals in a timely fashion. Review and restructure.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Joint CIO Council and HR Deans & Directors Meeting
Department of Computer and Information Sciences
Penn State Center for e-Design Site Vision and Capabilities
Ronald L. Larsen Dean & Professor
SR Engineering College Warangal
SANDIP UNIVERSITY COLLABORATIONS. ABOUT SANDIP UNIVERSITY Spread across 250+ acres of campus, Sandip University, a top engineering university in Nashik.
NSF Graduate Research Fellowship Program
IEEE Foundation: The Road Ahead
Presentation transcript:

Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of New York at Binghamton. Work experience: Interned at Emerson Network Power as: Information Technology professional Entry-level electronics engineer Embedded systems developer 1/17

What do I do? Research Access control policies Virtualization and cloud security Web security Biometric authentication Teaching Introduction to Computer Security Cryptography Network Security Computer Communications Operating Systems 2/17

First Things First: Special Thanks to Our Sponsors and Supporters! 3/17

ECS Security Center: A Vision of Excellence in Cybersecurity 4/17

What is Cybersecurity? Cybersecurity: Measures taken to protect a computer or computer systems against unauthorized access or attack (Merriam-Webster): C.I.A.: Confidentiality, Integrity, and Availability. A.A.A.: Assurance, Authenticity, Anonymity What does cybersecurity entail? Application Security Operating System Security Network Security Cloud Security Physical Security Infrastructure Security Much more… 5/17

The State of Cybersecurity: Cyberattacks are on the Rise! 6/17

How Can We Improve the State of Cybersecurity? Our Mission. Produce security talent through top-notch security education. Work symbiotically with industry partners and professionals across different disciplines to advance cybersecurity research. Serve the broader community by promoting cybersecurity awareness and literacy. 7/17

Taking Initiative: The Strategy (1) Goal 1: adapt an interdisciplinary approach to cybersecurity curriculum development: Computer Science: software, system, and network security. Electrical Engineering: security of the electrical grid systems. Civil Engineering: infrastructure security. Business and Information systems: Systems auditing, fraud- prevention/detection. Goal 2: support and sponsor student and faculty research in cybersecurity: Funding opportunities for security research projects. Engage students in research. 8/17

Taking the Initiative: The Strategy (2) Goal 3: Maintain symbiotic ties with industry partners: Solicit industry feedback guiding security curriculum development. Create security internship opportunities for students. Build a school-to-industry pipeline supplying industry partners with security talent. Encourage collaborative research projects between ECS faculty and industry professionals. Much more… 9/17

From Strategy to Tactics 10/17

Short-term Tactic 1 Expand existing curricula with new security courses in areas of thrust: Computer Science: Network Security ( Network Security Fundamentals Course; offered Fall 2014 onwards) Distributed Systems and Cloud Security ( Cloud Security Fundamentals; to be offered in Fall 2015 ). Computer Forensics ( Work in progress: joint cooperation with Bechtel Corporation ) Malware Analysis ( Work in progress: joint cooperation with Bechtel Corporation) Virtualization Security Web Security Enterprise Security Security courses for non-majors Security courses in other ECS disciplines. 11/17

Short-term Tactic 2 Incorporate relevant security topics into non-security courses: Web development: XSS, SQL Injection, and RFI attacks/countermeasures. Operating systems: file system, memory, and process security. Computer Communications: ARP poisoning attacks, TCP prediction attacks, etc. Engineering courses: designing temper-proof hardware, physical security, security of medical devices, etc. All courses: Teach to avoid the mistakes of the past: design systems with security in mind! Emphasize high-impact pedagogical practices based on hands-on experience. 12/17

Short-term Tactic 3 Recruit faculty professionals qualified to teach and shepherd our curriculum: Cryptography Digital Forensics Distributed Systems Security BigData Security Trusted platforms Mobile Security 13/17

Short-term Tactic 4 Support student organizations: Offensive Security Society (Computer Science): professional group of students interested in cybersecurity. ISACA (Business/ISDS): a worldwide association of information security professionals dedicated to the audit, control, and security of information systems (CSUF chapter). 14/17

Long-term Tactics (1) Tactic 1: establish undergraduate/graduate advising tracks in security. Tactic 2: establish undergraduate/graduate degree programs in cybersecurity. Tactic 3: establish a minor in security. Tactic 4: establish vibrant, high-impact, externally funded security research agenda. 15/17

The Holy Grail: meet National Security Agency’s (NSA’s) criteria for becoming a nationally recognized center of excellence in security education! 16/17 Long-term Tactics (2)

QUESTIONS? 17/17