WELCOME.

Slides:



Advertisements
Similar presentations
Introducing Computing At School An Overview Lee Willis Level 1 Master Teacher Computing At School.
Advertisements

a ADOPTION OF E-LEARNING BY THE ACADEMIC AND INDUSTRY STAFF
The Stage 1 French e-Portfolio Project. Meeting students' linguistic needs/expectations whilst fostering employability awareness. Newcastle University,
Relating research to practice Heather King Department of Education King’s College London.
Engineering Education in Saudi Arabia: Problems and Solutions
2 The key challenge to maintain a robust petroleum industry is ensuring an adequate supply of well trained professionals now and in future The development.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Birzeit University Experience in Designing, Developing and Delivering e-enabled Courses Palestine December,2005 Dr. Osama Mimi, Birzeit University.
introduction to MSc projects
Introduction to Student Learning Outcomes in the Major
MSP course 2007 Phase 0 – Setting up Kumasi, Ghana 2008 Wageningen International.
Msc Msc Informatique, Synthèse d’Images et Conception Graphique (ISICG) with direction Internet and Multimedia Technologies Joint Master Programme by.
Industrial Transformation Research Program—Training Centres and Hubs Centre Directors’ Forum 17 March 2015 Dr Fiona Cameron Executive Director, Biological.
Chapter 6 IT Cost Control Management of Computer System Performance.
ROLE OF A REVIEW TEAM LEADER Desi Curry. Journey in to Gateway  RTL for 7 years (National and Local)  First major project in NI to be subject.
Pedro Lourtie LLP Project: ATTRACT ” Enhance the Attractiveness of Studies in Science and Technology ” WP 7 - Attracting students to studies in science.
Authors Toni Pippola, Tampere University of Applied Sciences Timo Poranen, University of Tampere Matti Vuori, Tampere University.
PGD-1303 Software Project Management?. What is software? Software  Computer programs and associated documentation Documentation includes  requirements.
How to conduct good investigation in social sciences Albu Iulian Alexandru.
Translating Knowledge to On-the-Ground Results Henry L. Green, Hon. AIA National Institute of Building Sciences Congressional.
PBL in Team Applied to Software Engineering Education Liubo Ouyang Software School, Hunan University CEIS-SIOE, January 2006, Harbin.
Introduction to electronic resources management Workshop introduction and overview.
Universal Design in Third Level Design Teaching in Ireland Marie Callanan, Antoinette Fennell, Anthony Owens, Mark R. Dyer, James Hubbard, Ger Craddock.
The Extended Essay in IB Business & Management EXTENDED ESSAY.
Giving and Receiving Constructive Feedback
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Introduction Teaching and Assessment for Medical Educators is a programme designed to enhance teaching, learning, assessment, feedback and evaluation in.
Teaching with Data Cathy Manduca Iowa State University, 2005.
Extending the librarian role A Conversation Briefing with Linda Ward, Library Services Manager, University Hospitals of Leicester NHS Trust.
WISER: Teaching Information literacy This session will give an overview of the key concepts and models of information literacy as an important transferable.
Atmospheric Chemistry and Environmental Education in Global Change (ACE ED ) Atmospheric Chemistry and Environmental Education in Global Change (ACE ED.
Why Do I Have To Take This Course?!!!! STEM Connections and Community Based Learning.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Beach Modelling: Lessons Learnt from Past Scheme Performance Project: SC110004/S Project Summary.
Course Work 2: Critical Reflection GERALDINE DORAN B
THE INSTITUTION OF FIRE ENGINEERS THE INTERNATIONAL ORGANISATION FOR FIRE PROFESSIONALS – an interview with the Doctor A free preconference presentation.
Security and resilience for Smart Hospitals Key findings
CompSci 280 S Introduction to Software Development
Technical Business Consultancy Project
STRATEGIC ACADEMIC UNIT “PEOPLE & TECHNOLOGIES”
MICRO-TEACHING Submitted by, Alina Noronha B.Ed. Mathematics.
Inquiry-based learning and the discipline-based inquiry
Irish Survey of Student Engagement (ISSE) Results 2016
Project Management (x470)
“An online programme to enhance the quality of clinical education”.
Welcome slide.
* Dr. Christopher R. Bennett HTC Infrastructure Management Ltd.
Welcome to A2.
WHAT IS GSL? Our aim is to establish a network of future global leaders who are equipped to be leaders in their lives and society by delivering transformational.
Ice-breaker If you were fruit or vegetables, what would you like to be? Why?
Business and Management Research
CERTS Workshop 2: Cyber Degrees and Skills Certifications
Teaching with Instructional Software
Building a Digital Ready Workforce
Robert W. Lingard California State University, Northridge
Enhancing Autonomy & Employability Amongst Engineering Students by the Use of Embedded ‘learning-by-doing’ Teaching Practices Dr Hafid Belaidi & Dr Robert.
Overview of Computational Science Education Materials
An Introduction to Software Engineering
The Organisation of Mathematics Provision in Colleges
Robert W. Lingard California State University, Northridge
Business and Management Research
Advisory Council October 20, 2015
Stakeholder Involvement in Nuclear issues Workshop: Milestones for Nuclear Power Infrastructure Development November 5-9, 2007 Why Stakeholders are.
Welcome to Cyber Recruiter – Administration Training
THE PROCESS OF INTERACTION DESIGN
RBWM SCITT Mentor Meetings 2017.
SAFEGUARDS CAPACITY BUILDING ARGENTINE EXPERIENCE
Doc. PaedDr. PhDr. Jiří DOSTÁL, Ph.D.
Roles and Responsibilities of the tutor
Technical Guidelines for the Development of International Standards for Small Hydropower Plants   DONG Guofeng ICSHP  7 November, 2018.
Presentation transcript:

WELCOME

Developing Pedagogy to Optimise Forensic Training in Safety Related ICS

Background Pedagogy – the theory and practice of teaching and how these influence student learning. The Research Institute in Science of Cyber Security (RISCS) workshop stressed the role GCHQ Research Institutes must play in influencing best practice in this area. The researchers expressed their concern that research findings tend to disappear into a vortex, which they call “The Void”. Well summed up by the CISO of a global organisation, who told them that academic research was generally not well disseminated outside of academic circles and did not reach him in a form that’s useful in the real world. We have found that there is little or no empirical work on effective approaches for training professional systems engineers.

Background Very few courses on ICS address forensics. They will include Kali Linux as a tool box but little else. Now with NIS requirements industry need to be able to identify when they have been attacked. This can be very difficult in an IT environment but it is even harder in an ICS environment. Courses also need to be able to explain the consequence of investigation actions and appropriate steps for safety and safety related systems. There is significant gaps in this area.

Way Ahead We need to look at how we are using ICS test beds. What are the engineers getting from time on the test beds? What are we (UK) getting for these investments? Is the existing setup actually producing the skill set industry and the country needs. The US DoD have done some work in looking at SCADA test beds and the proficiency of the teams in the exercises. The results showed that the teams were not meeting the expectations of the NIST 800-61 standard. Does the NIST standard need to be reviewed against actual response times. It is important that the research is build on actual experiences so that realistic timelines can be set.

Phase 1 In Phase 1 we will consider 3 groups: Cyber Apprentices Engineers from the UK CNI GCHQ RIs The Cyber Apprentices into the lab to work along side the students. It will also allow the Apprentices to get direct insight into the research being carried out and get time to experiment on the devices. The aim is to give them hands on time with the tool sets we have been developing and getting feedback from the users. We are not worried if they “break” something because that’s part of working in the lab, we can always re install code. We also plan to open up the lab to plant computer specialists from the UK CNI and GCHQ RIs to observe the interaction in peer learning between the groups and the students.

Phase 2 In this phase we plan to analysis the work done in Phase 1. Also consider the work done at Stanford/UNO on IT forensic training courses to see how this can be adopted to this research. Looking to develop some of the Stanford work along side the ICS cyber security question set developed by UK CNI. The aim is to design, deliver and review pure peer forensic courses suitable for the 3 different groups studied in Phase 1 Present a strategy for establishing the scientific basis needed to ensure validity of future pedagogy to increase the UK resilience of UK CNI. Finally building on existing contacts with US DHS and ENISA to host an international workshop at Glasgow Uni on this topic.

Future Need to identify effective training in forensics for different levels of expertise and skills. How we provide CISOs with an overview of ICS forensic techniques.

THANK YOU #UofGWorldChangers @UofGlasgow