Computer Science and Engineering 1 Future of Cyber Security
Top Security Threats 2013 Threat #1: Social Engineering Threat #2: Advanced Persistent Threats (APTs) Threat #3: Internal Threats Threat #4: Bring-your-own-device (BYOD) Threat #5: Cloud Security Source: Forbes Magazine, biggest-cybersecurity-threats-of / Computer Science and Engineering 2
What can we do? Computer Science and Engineering 3
4 Information Assurance Research Education
Computer Science and Engineering 5 IA Research Wenyuan Xu (since 2007) Wireless networking and security, sensor networks, network security and privacy, jamming detection and avoidance Chin-Tser Huang (since 2003) Intrusion detection, wireless security, distributed systems network security, network protocol design and verification Csilla Farkas (since 2000) Web data and application (WS & SOA) security, Access Control Policies, SCADA software reliability, economic and social impact of cyber attacks Application layer Transport layer Internet layer Network Interface
Computer Science and Engineering 6 Information Assurance SpecializationInformation Assurance Specialization Meeting National IA Training StandardsMeeting National IA Training Standards CNSS 4011, Information Systems Security Professionals CNSS 4013, System Administrators CNSS 4014, Information Systems Security Officers National Center of Academic Excellence in Information Assurance EducationNational Center of Academic Excellence in Information Assurance Education IA Education
IA Specialization Undergraduate and graduate students of CSE Dept. Receive National Training Standard for Information Systems Security (INFOSEC) Professionals, CNSS 4011 Degree Requirements: 9 Hours of course work with B or better grade –Required: CSCE 522: Information Security Principles (3 credits) –2 elective courses (6 credits) Computer Science and Engineering 7
8 IA Courses CSCE 201 – Introduction to Security CSCE 517 – Computer Crime and Forensics CSCE 522 – Information Security Principles CSCE 557 – Introduction to Cryptography CSCE 548 – Secure Software Construction Projects in other courses, e.g., CSCE 520, 416, etc. Magellan Scholar
Computer Science and Engineering 9 Global Demand for IA Workforce Worldwide: –2010: 2.28 million –2015: 4.24 million (projected) –Compound Annual Growth Rate: 13.2% Americas: –2010: 920,845 –2015: 1,785,236 –Compound Annual Growth Rate: 14.2% Information Warfare - Farkas 9
Computer Science and Engineering 10 Salary 2011 Annual salary(ISC) 2® Member/non-member Worldwide: $98,600/$78,500 Americas: $106,900/$92,900 10
Computer Science and Engineering 11 IA Jobs Job market –Civil (Join Information Systems Security Association, ISSA, ) –Government (Internship available at USC-UTS, and SC Dept. of Probation, Parole, and Pardon Services) –Military (Internship available at SPAWAR, Charleston) Education and training requirements (B.S. degree, certification, hands-on experiments) Salary FUN
Current IA News Is the FBI Any Match for Cyber Criminals?, cyber- criminals?et_cid= &et_rid= &locatio n=top#.Uo0bQydkHj4 cyber- criminals?et_cid= &et_rid= &locatio n=top#.Uo0bQydkHj4 –After 9/11: FBI shifted from organized crime to fighting terrorism –Current: counter cyber attacks Computer Science and Engineering 12
US Ponders Ways Not to Destroy Bitcoin, ways-not-destroy- bitcoin?et_cid= &et_rid= &location= top#.Uo0cjSdkHj4 ways-not-destroy- bitcoin?et_cid= &et_rid= &location= top#.Uo0cjSdkHj4 –Illegal use of bitcoin should it be destroyed? –Over-regulation bitcoin moves out of US control Computer Science and Engineering 13 Current IA News
NSA Vowed to Fix Its Collection Errors, its-collection-errors#.Uo0dNSdkHj4 its-collection-errors#.Uo0dNSdkHj4 –Admitted surveillance rule violations due to poor management, lack of oversight, typographical errors –Promise of safety measures Computer Science and Engineering 14 Current IA News
More News Miners Face Rising Threat of Cyber Attacks due to increased automation Cyber Deviance and Cyber Crime Start and Peak in Teen Years start around 15 and peak around 18 Five More Suspects Arrested in $45 Million Global Bank Heist – loss 45 million from ATM Chicago hacker sentenced to 10 years, “hacktivist" Jeremy Hammond explained that his cybercrimes were altruistic acts of civil disobedience Computer Science and Engineering 15
Computer Science and Engineering 16 Thank you!