 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Protection of Information Assets I. Joko Dewanto 1.
Cyber Education Project Accreditation Committee November 2014.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
NETWORK SECURITY.
Security Certification
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
UNIT 9 SEMINAR – THE LAST ONE  ! Unit 9 Chapter 9 in CompTIA Security + 1 Course Name – IT Introduction to Network Security Instructor – Jan McDanolds,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Certification and Training Presented by Sam Jeyandran.
Sindhuri Juturu Department of Computer Science Texas Tech University
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Designing Security for Microsoft® Networks Course 2830B.
Module 14: Configuring Server Security Compliance
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Access Security IS3230.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
IS3220 Information Technology Infrastructure Security
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Securing Information Systems
Department of Computer and Information Sciences
CMIT100 Chapter 15 - Information.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
CISSP TRAINING IN.
CIS 333 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 RANK Perfect Education/ cis333rank.com.
CIS 333 RANK Lessons in Excellence-- cis333rank.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CIS 333 Teaching Effectively-- snaptutorial.com
CyberPaths Interdisciplinary Modules
Chapter 1: Information Security Fundamentals
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Cybersecurity compliance for attorneys
Chapter 1: Information Security Fundamentals
Module 8: Securing Network Traffic by Using IPSec and Certificates
Information Assurance & Network Security Certificate
World-Leading Research with Real-World Impact!
CyberPaths Interdisciplinary Modules
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock, Texas This research was supported by the National Science Foundation (Grant No ). Opinions, findings, and conclusions/recommendations are those of the authors and do not necessarily reflect the views of the NSF. 5/1/15TTU Faculty Workshop on Cybersecurity for Critical Infrastructure 1

Cybersecurity for Information Systems  A core course in the Cybersecurity for Critical Infrastructure certificate program  Covers a wide breadth of practices for assuring information systems security  Fundamentals of Information Systems Security, by D. Kim and M. Solomon, Jones & Bartlett, Information Systems Security & Assurance Series,  Covers the seven domains of the International Information Systems Security Certification Consortium (ISC) 2 TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 2

Seven Domains of an IT Infrastructure From Fundamentals of Information Systems Security, D. Kim and E. Solomon, 2 nd Edition, Jones and Bartlett, TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 3

Topics Covered  Access Controls  Security Operations and Administration  Auditing, Testing, and Monitoring  Risk, Response, and Recovery  Cryptography  Networks and Telecommunications  Malicious Code and Activity  IS Standards, Education, Certifications, and Laws TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 4

Additional Topics Covered  Case Studies  TJX Case, Maroochy Water Breach, Stuxnet, Other high- profile cases, Current events  Biometrics  Legal Issues  Freedom of Information Act, Einstein NIS, US Patriot Act, Computer Fraud and Abuse Act  Compliance Laws  Federal Information Systems Management Act, Gramm- Leach –Bliley Act, Sarbannes-Oxley Act, Family Educational Rights and Privacy Act TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 5

Virtual Security Cloud Lab  Hands-on lab in a cloud computing environment using cutting edge technology  Students can test their skills with realistic security scenarios that they will encounter in their careers  The mock IT infrastructure was designed to mimic a real-world IT infrastructure consisting of the seven domains of a typical IT infrastructure  Each lab provides learning objectives, step-by-step instructions, evaluation criteria, and lab assessment questions TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 6

VSCL Mock IT Infrastructure From Fundamentals of Information Systems Security, D. Kim and E. Solomon, 2 nd Edition, Jones and Bartlett, TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 7

VSCL Lab Topics  Performing Reconnaissance and Probing Using Common Tools  Performing a Vulnerability Assessment  Enabling Windows Active Directory and User Access Controls  Using Group Policy Objects and MS Baseline Security Analyzer for Change Control  Performing Packet Capture and Traffic Analysis  Implementing a Business Continuity Plan TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 8

VSCL Topics  Using Encryption to Enhance Confidentiality and Integrity  Performing a Website and Database Attack by Exploiting Identified Vulnerabilities  Eliminating Threats with a Layered Security Approach  Implementing an Information Systems Security Policy  TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 9

Assessment Activities  Exams  Virtual Cloud Labs  Lab deliverables and assessment worksheets  Students present lab deliverables and assessment  In-class, team-led discussions of case studies and related topics  Information systems security policy project  Graduate research papers and presentations TTU Faculty Workshop on Cybersecurity for Critical Infrastructure5/1/15 10