Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.

Slides:



Advertisements
Similar presentations
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Advertisements

S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Cyber Education Project Accreditation Committee November 2014.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
UNCLASSIFIED Shaping the Future of Cybersecurity Education October 2010 NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) Is N.I.C.E.
MoHealthWINs MoHealthWINs Open Learning Initiative Co-Development Project October 31, 2013.
Security Controls – What Works
By Collin Smith COBIT Introduction By Collin Smith
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License -
IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development EDUCAUSE Live! November 14,
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Controls for Information Security
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Human Systems Engineering Concentration Amy Bayes 15 October 2014.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Software Verification and Validation (V&V) By Roger U. Fujii Presented by Donovan Faustino.
Sindhuri Juturu Department of Computer Science Texas Tech University
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
 A set of objectives or student learning outcomes for a course or a set of courses.  Specifies the set of concepts and skills that the student must.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Abstract A software development life cycle can be divided into requirements elicitation, specification, design, implementation, testing, and maintenance.
It’s a Give and Take World ITEA Conference San Antonio, Texas.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
1 The proposed UK computing masters benchmark 5th TEMPUS JEP Meeting Belgrade April 26/27.
Challenges in Infosecurity Practices at IT Organizations
Chapter 3 Multimedia Skills
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Information Systems in Organizations 3.2 Systems Management.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
1 IT/Cybersecurity - ICRDCE Conference Day Aligning Program, Course, and Class Objectives / Outcomes.
Society for Maintenance and Reliability Professionals (SMRP)
Department of Computer and Information Sciences
and Security Management: ISO 28000
DT249/4 Information Systems Engineering Lecture 0
Discussion and Conclusion
ACM/IEEE-CS Computer Science Curriculum
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Information Technology Pathway Updates
Cyber Education & Research
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Security for Safety: Enabling Digitalization of Railway Systems
Comparison to existing state of security experimentation
Technology Department Annual Update
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Panel Members: Qing Hui (ME), Jordan Berg (ME) Sunho Lim (CS), Brian Nutter (ECE), Susan D. Urban (IE) May 3, 2013 Support for this work was provided by the National Science Foundation’s Federal Cyber Service: Scholarship for Service (SFS) program under Award No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Courses Taught in Spring 2013 IE 4331/5331 Cybersecurity for Information Systems – Co-Taught by Susan Urban (lead) and Joseph Urban IE 4331/5331 Software Security – Co-Taught by Joseph Urban (lead) and Susan Urban Challenge for both courses was to teach cybersecurity and software security to engineering students. Both courses were composed of CS and IE students, with IE student having no programming background.

Cybersecurity for Information Systems REQUIRED TEXT: Cybersecurity: The Essential Body of Knowledge, D. Shoemaker and A. Conklin, Cengage Learning, Covers the Department of Homeland Security Essential Body of Knowledge for Cybersecurity Has a running case study throughout each chapter to present the concepts in the context of a specific organizational scenario.

Cybersecurity for Information Systems EXPECTED LEARING OUTCOMES: Students who complete this course will be able to: Understand the cybersecurity issues involved in trying to secure a complex organization. Define the executive, functional, and ancillary roles of cybersecurity work. Identify the competency areas that compose a cybersecurity body of knowledge. Understand recommendations and activities to manage, design, implement, and evaluate cybersecurity competency areas. Develop comprehensive cybersecurity solutions for an organization.

Cybersecurity for Information Systems Competency areas: data security, digital forensics, enterprise continuity, incident management, training and awareness, operation and maintenance, network and telecommunications security, personnel security, physical security, procurement, legal and regulatory compliance, risk management, software security Homework assignments: cryptography, biometrics, intrusion detection, malicious code, and cybersecurity law. Graduate research projects: Research issues for the Smart Grid on device level security, cryptography, system level security, networking, and privacy. Covered Sans Top 20 Critical Controls and Top 25 Software Errors.

Software Security REQUIRED TEXT: Jason Grembi, Secure Software Development: A Security Programmer’s Guide, 1st Edition, Cengage Learning, COURSE OBJECTIVES: This course is to provide a comprehensive understanding of a secure software development process. The course includes issues on systems engineering and software interface, attack vulnerabilities, and acquisition strategies for security. Development issues for security will cover elicitation and analysis, design patterns, secure code, and testing. Topics will also include dependability, reliability, software assurance, and life cycle integration.

Software Security CLASS SECURITY GROUP PROJECTS: ATM; Pizza Delivery; Health Records; and Social Media X Three Different Aspects Required to define system and software requirements with focus on security, design use/misuse case diagrams with mapping to Sans Top 20 Critical Controls, interaction diagrams, risk analysis IEEE Std Guide for Developing System Requirements Specifications IEEE Std. 830 Recommend Practice for Software Requirements Specification GRADUATE SECURITY GROUP PROJECTS: CAPTCHA Technology; Cloud Computing; Design Through Maintenance Security in the Software Life Cycle; Project Management; and Requirements Formulation / Analysis