Information Assurance Program at West Point

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
UNM Information Assurance Scholarship for Service (SFS) Program.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
IMAGERY & INTELLIGENCE SOLUTIONS, INC. 360 ° of Imagery Introducing IIS Inc. Imagery and Intelligence Solutions Incorporated (IIS Inc.) is a service-connected.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Gerald M. Santoro, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA (slides.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Network Security Testing Techniques Presented By:- Sachin Vador.
Information Assurance Workshop 2004 Yu Cai. Introduction 5th Annual IEEE Information Assurance Workshop June 2004, United States Military Academy,
Yan Chen Dept. of Computer Science Northwestern University Information Security Curriculum Development in Northwestern.
Cyber Security/Information Security Definitions
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Overview CSE 465 Information Assurance
Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
The IWAR Range: a Laboratory for Undergraduate Information Assurance Education By Maj. Joseph Schafer (Naval War College), Daniel J. Ragsdale and John.
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
United States Department of Defense
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Communications-Electronics Security Group. Excellence in Infosec.
Cyber Education: A Multi-Level, Multi-Discipline Approach Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor United States Military.
IS Network and Telecommunications Risks Chapter Six.
SSC Pacific – A Strong Community Partner And Economic Engine… Yesterday, Today and Tomorrow CAPT Mark Kohlheim, Commanding Officer 17 NOV 09 SSC Pacific.
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
Center for Cybersecurity Research and Education (CCRE)
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
Department of the Navy’s (DoN’s) Historically Black Colleges and Universities/ Minority Institutions (HBCU/MI) Cybersecurity/ Information Assurance (CS/IA)
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Imagine, Create, and Secure a Stronger Peace… National Defense University Col Kris Bauman, USAF, PhD Senior Military Fellow, Institute for National Strategic.
Accelerated Adaptation Evolution The learning contest between the IDF and its adversaries ( ) Hezbollah [aided by Iran], Hamas, Islamic Jihad (Gaza),
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Department of Computer and Information Sciences
Working at a Small-to-Medium Business or ISP – Chapter 8
Systems Security Keywords Protecting Systems
J. A. “Drew” Hamilton, Jr., Ph.D.
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
CyberPaths Interdisciplinary Modules
ACM/IEEE-CS Computer Science Curriculum
Prepared By : Binay Tiwari
Chapter 9 E-Commerce Security and Fraud Protection
SPACE AND MISSILE DEFENSE WORKING GROUP
UNM Information Assurance Scholarship for Service (SFS) Program
Information Assurance & Network Security Certificate
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
UNM Information Assurance Scholarship for Service (SFS) Program
CyberPaths Interdisciplinary Modules
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Assurance Program at West Point IA in 2002 – Vital National Security Issue We are losing ground More vulnerable than ever Solution? Research and education (HOPE!) Background itoc IA initiatives USMA CDX Overview Words IWAR Daniel-Ragsdale@usma.edu John.Hill@usma.edu Scott.Lathrop@usma.edu Gregory.Conti@usma.edu

USMA Information Assurance Program IA Research Center (ITOC) NSA Support Institutional Support Tremendous Interest Quality Personnel 1999 2000 2001 2002 2003 IA Workshop and Conferences IA Savvy Personnel USMA CERT Outreach/ Research Information Warfare Lab (IWAR) Summer Internships Cyber Defense Exercise Student IA Club (SIGSAC) Courses and Curriculum Integrated effort Interest Input: Increased need (Demand) for people who are knowledgeable in this area Output much more knowledgeable students and faculty

USMA IA Program IA Research Center (ITOC) NSA Support IA Conferences CERT Outreach/ Research Information Warfare Lab (IWAR) Summer Internships Cyber Defense Exercise Student IA Club (SIGSAC) Courses and Curriculum Integrated effort Interest Input: Increased need (Demand) for people who are knowledgeable in this area Output much more knowledgeable students and faculty

USMA IA Program Mission “Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah …” -LTC Dan Ragsdale ITOC Director Integrated effort

Information Assurance Courses Primary CS482 Information Assurance IT460 Policy and Strategy of Cyberwar MA489 Cryptography LW489 Cyberlaw Supporting CS484 Computer Networks IT105 Introduction to Information Technology IT305 Introduction to Military Information Technology Other computer science courses Have IA awareness woven into them

Student IA Club ACM SIGSAC Chapter Formed January 2001 450+ Members Interdisciplinary (All Academic Departments Represented) Won 2001-2002 ACM Outstanding Activities Award SIGSAC IWAR Lab Speakers Community Service www.itoc.usma.edu/sigsac/

Summer Internships [1 of 2] NSA - Network Evaluation Intern Program US Secret Service, Electronic Crimes Branch – Honeypot research Joint C4ISR Battle Center - Enhanced C4ISR Homeland Security Operations (ECHO) ITOC - Information Assurance Vulnerability Alert (IAVA) Compliance Prototype AMC-DOD - UAV multi-mission payload analysis Microsoft – Microsoft Intern              NSA Internship grew from 1 to 2 to 4-7

Summer Internships [2 of 2] US Army Information Technology Agency - Network Security Services-Pentagon Livermore National Laboratory - UAV Simulation High Performance Computing Modernization Office - Network Monitoring Initiative RCERT Pacific - Intrusion Detection and Analysis 1st IO Command(ACERT,RCERT Korea & Europe) - Intrusion Detection and Analysis AMC-DOD - Crowd Simulation in Realistic Simulations NSA Internship grew from 1 to 2 to 4-7

Guest Speaker Program Government Military Academia Business

ITOC Research Topics Information Technology and Operations Center Decision Support Automated Imagery Analysis Automated Terrain Analysis Information Assurance Network Deception (Honeynets / Network Camouflage) Open Source Tool Employment Intrusion Detection and Response Information Assurance Simulation Network and Computer Forensics Wireless Security

ITOC Outreach Projects Information Assurance Vulnerability Alert (IAVA) Compliance Prototype – NSA, 1st IO Command Network Deception (Honeynets) - 1st IO Command, US Secret Service Information Assurance Curriculum and Training Development – NSF, 1st IO Command Classroom XXI – Army Training and Doctrine Command Military Academy Attack Defense Network (MAADNet) – Office of the Secretary of Defense, NSF Network Forensics and Email Recovery– US Secret Service Wireless Security T4IA – NSF

Sponsored by IEEE and NSA 4th Annual IEEE Information Assurance Workshop June 18-20, 2003 West Point, New York Sponsored by IEEE and NSA http://www.itoc.usma.edu/workshop/

Information Warfare Analysis and Research (IWAR) Lab Isolated network Wide variety of target machines Full 18 seat classroom Dedicated lab director Used to support courses CS482 Information Assurance (primary user) SS490 Policy and Strategy of Cyberwar (primary user) CS484 Networks (projected) IT105 Intro to Information Technology (awareness) IT305 Intro to Military Information Technology

IWAR Laboratory Design Goals Realistic Provide a “real world” signature Shared Resources Soft and Hard targets Heterogeneous Operating Systems Network Protocols/Equipment Offensive and Defensive Tools Reconfigurable Ghost Images Removable hard drives

IWAR Tools and Capability Firewalls Malicious Active Content Exploits Vulnerability Scanners Viruses and Worms Cryptography and Encryption Trojan Horses Application and Protocol Wrappers Buffer Overflow Exploits Honey Pots/Honeynets Access Control Methods Protocol Exploits Integrity Maintenance Systems Network Sniffers Mail and Protocol Spoofers Distributed DoS Tools Intrusion Detection Systems Race Condition Exploits Password Cracking Software Forensics Analysis Tools Port Scanners Plenty of tools - Many can be used by both sides For example take the password cracker Why do we teach hacker tools? Much like in conventional battle space, In order to defend in cyber space must understand the methods that potential adversaries might use

To provide a realistic, isolated environment for instruction, research, and analysis on information assurance topics. Two heterogeneous networks Over 200 nodes Host-based and network-based firewalls Eight distinct operating systems Wireless network

IWAR-in-a-Box To provide a realistic, isolated environment for instruction, research, and analysis on information assurance topics. Two heterogeneous networks Over 200 nodes Host-based and network-based firewalls Eight distinct operating systems Wireless network

Cyber Defense Exercise Sponsored by the National Security Agency, Director of Information Assurance General Concept Defense of a network against an adversarial force Blue Forces US Service Academies and NPS Red Forces National Security Agency 92nd Information Warfare Aggressor Squadron 1st Information Operations Command White Cell Carnegie Mellon

Cyber Defense Network $250K PKI PMO funding - 2 tier deliveries Resource for PKI IA security engineering & research. Instructional tool for PKI Information Assurance education in ALL military & affiliated academies. Significant C3I, JCS and NSA interest & support. Provide facilities to evaluate & “test drive” software before putting into production environment. Develop DoD PKI enabled offensive & defensive operational techniques and strategies. $250K PKI PMO funding - 2 tier deliveries 2 Mill over the life so far Next =>

Cyber Defense Exercise Key Educational Aspects Competitive Active learning Project-based Developmental Areas Leadership Ability Planning Ability

CDX Award Ceremony Need to show a summary slide indicating what this means to them in the field.

NSA Full Time NSA Liaison IA Conference Sponsorship NSA Trip NSA Internships Intelligence Community Access CDX Support Sabbaticals NSA Information Assurance Center of Excellence Program NSA Information Assurance Director’s Trophy

Preparation for War “On the fields of friendly strife are sewn the seeds that upon other fields on other days will bear the fruits of victory…” GEN Douglas MacArthur Are there any questions

Preparation for Information War “On the networks of friendly strife are sewn the seeds that upon other networks on other days will bear the fruits of victory…” MAJ Greg Conti Are there any questions

USMA IA Program IA Research Center (ITOC) NSA Support IA Conferences CERT Outreach/ Research Information Warfare Lab (IWAR) Summer Internships Cyber Defense Exercise Student IA Club (SIGSAC) Courses and Curriculum Integrated effort Interest Input: Increased need (Demand) for people who are knowledgeable in this area Output much more knowledgeable students and faculty

USMA IA Program IA Research Center (ITOC) Institutional Support NSA Support Institutional Support IA Savvy Personnel IA Conferences IA Research Center (ITOC) USMA CERT Outreach/ Research Information Warfare Lab (IWAR) Summer Internships Cyber Defense Exercise Student IA Club (SIGSAC) Courses and Curriculum Integrated effort Interest Input: Increased need (Demand) for people who are knowledgeable in this area Output much more knowledgeable students and faculty Quality Personnel Tremendous Interest

Sponsored by IEEE and NSA Questions? … and a reminder! 4th Annual IEEE Information Assurance Workshop June 18-20, 2003 West Point, New York Sponsored by IEEE and NSA http://www.itoc.usma.edu/workshop/