Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Ethics, Privacy and Information Security
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Building a Successful Security Infrastructure
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Securing Information Systems
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
SEC835 Database and Web application security Information Security Architecture.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Chapter 4 Application Level Security in Cellular Networks.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Azam Supervisor : Prof. Raj Jain
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Computer Science and Engineering 1 Mobile Computing and Security.
SMUHACNet 2005 Information Infrastructure for Border and Transportation Security Suku Nair.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
IS3220 Information Technology Infrastructure Security
QM/BUPT Joint Programme Final Year Projects Dr Jonathan Loo
Unit 2 Personal Cyber Security and Social Engineering Part 2.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
CMIT100 Chapter 15 - Information.
Capabilities Matrix Access and Authentication
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Securing Information Systems
Information Security at Florida State University
Information Security at Florida State University
5G Security Training
I have many checklists: how do I get started with cyber security?
Information Security at Florida State University
Information Security at Florida State University
How to Mitigate the Consequences What are the Countermeasures?
Cyber Education & Research
Information Assurance & Network Security Certificate
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Panel Members: S. D. Urban (IE), Qing Hui (ME), Brian Nutter (EE), Sunho Lim (CS) November 9, 2012 Support for this work was provided by the National Science Foundation’s Federal Cyber Service: Scholarship for Service (SFS) program under Award No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Course Plan

Cybersecurity Certificate and Concentration Options

Mechanical Engineering ME 4334 Feedback Control of Dynamic Systems (D) Analysis and design of control systems, including applications to electromechanical systems Feedback control to modify behavior of dynamic systems Change to stability, transient response, and steady-state error through dynamic compensation Modern control through state-space models ME/Math 5312 Control Theory I (D) First course in advanced control theory Linear systems theory Robust and optimal control Introduction to stochastic control Model reduction and control of large-scale systems

Mechanical Engineering ME 5314 Nonlinear Dynamics (D) Analysis of complex and nonlinear dynamic systems Stability and robustness Bifurcation, catastrophe, and chaos Time-series analysis ME 4331/5331 Networked and Industrial Control Systems (D) Hierarchical and distributed control systems Control of stochastic systems Communication protocols Effects of communication delay and network dynamics Fault detection and recovery Cybersecurity for networked and industrial control systems

Electrical and Computer Engineering ECE 4325/5325 Telecom Networks (D) Provides a wide breadth of practices for network engineers Network security, encryption, scrambling, reliability, spoofing Network traffic analysis and packet sniffing ECE 4375/5375 Computer Architecture (D) Provides a wide breadth of practices for device designers Protection of intellectual property Trustworthy computing architectures ECE 4380/5380 Embedded Systems (D) Provides a wide breadth of practices for system designers Protection of intellectual property Trustworthy computing algorithms ECE 5331 Cybersecurity for Smartgrids (E) Risk factors for SCADA and other infrastructure elements Security methods, procedures, and vulnerabilities

Industrial Engineering IE 4331/5331Cybersecurity for Information Systems (E/L) Provides a wide breadth of practices for information system security Covers the DHS essential body of knowledge Competencies for data security, digital forensics, enterprise continuity, incident management, Information systems operation/maintenance, network security Personal/physical security, legal/regulatory compliance, risk management IE 4331/5331 Software Security (D) Address the secure software development process. Systems engineering/software interface, attack vulnerabilities Acquisition strategies for security Elicitation and analysis, design patterns, secure code, testing Dependability, reliability, software assurance, life cycle integration Define critical infrastructure case studies for each of the above courses.

Industrial Engineering IE 4331/5331 Cyber Attacks Cyber attack capabilities, attack technologies, engineering attack and defense Civilian and military policy, ethics of cyber attacks, societal impacts Possibly co-taught with Dr. Vickie Sutton from the Law School IE 5308 Risk Assessment of Human Behavior (D) Risk calibration and analysis Multiple risk aggregation Group decisions Potential Enhancement: Define security specific modules on issues and/or critical infrastructure case studies IE 5309 Risk Modeling and Assessment (D) Risk analysis and management Risk analysis methods Failure consequences, data for risk management, risk communication Potential Enhancement: Define security specific modules on issues and/or critical infrastructure case studies

Computer Science 5332 Secure Software Engineering (D) Secure requirements specifications Secure software design Validation (assessment) of security properties in requirements modeling and design Secure programming Testing for security properties (security assurance) 4331/5331 Information Assurance and Security (D) Symmetric and public key cryptography, hash functions, cryptanalysis Authentication, authorization, security protocols Software flaws, software malware, reverse engineering Digital rights management, trusted operating systems

Computer Science 4331/5331 Network Security (D) Network security threats and issues Cryptography and cryptographic protocol Firewall, Virtual private network (VPN), IPSec Network intrusion detection, wireless network security protocol 4331/5331 Opportunistic Mobile Networks (D) Networks architecture and protocols - ad hoc networks (MANETs), wireless sensor networks (WSNs) focused Routing, broadcast, caching, and medium access control (MAC) protocols Potential Enhancement: Secure routing and MAC protocols 4331 Embedded Systems (D) Embedded software and hardware architecture Intel ® Atom-specific architecture and its characteristic Embedded programming Potential Enhancement: Secure embedded software and programming