Computer Science and Engineering 1 Future of Cyber Security.

Slides:



Advertisements
Similar presentations
CSIT IA Programming Misc NA
Advertisements

EC-Council | Press The Security Books You Have Been Waiting For!
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Legal and Ethical Issues in Computer Security
Revised MS Program in Computer Science INFORMATION AND COMPUTER SCIENCE DEPARTMENT October 2002.
1 University of Houston-Clear Lake Management Information Systems.
Overview CSE 465 Information Assurance
CSCE 211: Digital Logic Design
Computer and Information Technology Core courses focus on problem solving and communication skills for Information Technology professionals involved in.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Legal and Ethical Issues in Computer Security Csilla Farkas
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Cybersecurity nexus (CSX)
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
AFCEA/AFA July 23,  There are 35 colleges and universities across the state that are members of the University System of Georgia.  All of them.
Computer Information Systems. Overview  What is Information Systems (IS)?  Computer Information Systems (CIS) Major  Careers in CIS/IT.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
CSCE 727 Information Warfare
Assessment Presentation Philip Robbins - July 14, 2012 University of Phoenix Hawaii Campus Fundamentals of Information Systems Security.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Information and Computation Assurance Programs in the Ohio State University Neelam Soundarajan Computer Sc. & Eng. Dept. Ohio State University.
Graciela Perera– August 23, 2010 Department of Computer Science and Information Systems Slide 1 of 14 OVERVIEW FOR NETWORKING CONCEPTS AND ADMINISTRATION.
Center for Cybersecurity Research and Education (CCRE)
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Associate of Applied Science Degree Information & Telecommunication Technology Scott edu
Revised MS Program in Computer Science INFORMATION AND COMPUTER SCIENCE DEPARTMENT December 2002.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
Information Warfare Playgrounds to Battlegrounds.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
CSCE 727 Industry Certifications in IA. Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by (ISC) 2® Prepared by Robert Ayoub, CISSP,
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
CSCE 211: Digital Logic Design Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Cyber and Information Security Workforce Presented By: Tom Flynn, CEcD Director, Business Development Prince William County Department of Economic Development.
Information Management System Ali Saeed Khan 29 th April, 2016.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Cyber and Information Security Workforce
Department of Computer and Information Sciences
Cyber Security Policy Analysts
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
CSCE 211: Digital Logic Design
Information Security at Florida State University
Information Security at Florida State University
Development of the Next Generation Work Force (NGWF)
ACM/IEEE-CS Computer Science Curriculum
Csilla Farkas Cybersecurity Csilla Farkas
Information Security at Florida State University
Information Security at Florida State University
CSCE 813 Internet Security Fall 2012
UNM Information Assurance Scholarship for Service (SFS) Program
Introduction to Information Assurance
Information Assurance & Network Security Certificate
World-Leading Research with Real-World Impact!
UNM Information Assurance Scholarship for Service (SFS) Program
Introduction to Course
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Computer Science and Engineering 1 Future of Cyber Security

Top Security Threats 2013 Threat #1: Social Engineering Threat #2: Advanced Persistent Threats (APTs) Threat #3: Internal Threats Threat #4: Bring-your-own-device (BYOD) Threat #5: Cloud Security Source: Forbes Magazine, biggest-cybersecurity-threats-of / Computer Science and Engineering 2

What can we do? Computer Science and Engineering 3

4 Information Assurance Research Education

Computer Science and Engineering 5 IA Research Wenyuan Xu (since 2007) Wireless networking and security, sensor networks, network security and privacy, jamming detection and avoidance Chin-Tser Huang (since 2003) Intrusion detection, wireless security, distributed systems network security, network protocol design and verification Csilla Farkas (since 2000) Web data and application (WS & SOA) security, Access Control Policies, SCADA software reliability, economic and social impact of cyber attacks Application layer Transport layer Internet layer Network Interface

Computer Science and Engineering 6 Information Assurance SpecializationInformation Assurance Specialization Meeting National IA Training StandardsMeeting National IA Training Standards CNSS 4011, Information Systems Security Professionals CNSS 4013, System Administrators CNSS 4014, Information Systems Security Officers National Center of Academic Excellence in Information Assurance EducationNational Center of Academic Excellence in Information Assurance Education IA Education

IA Specialization Undergraduate and graduate students of CSE Dept. Receive National Training Standard for Information Systems Security (INFOSEC) Professionals, CNSS 4011 Degree Requirements: 9 Hours of course work with B or better grade –Required: CSCE 522: Information Security Principles (3 credits) –2 elective courses (6 credits) Computer Science and Engineering 7

8 IA Courses CSCE 201 – Introduction to Security CSCE 517 – Computer Crime and Forensics CSCE 522 – Information Security Principles CSCE 557 – Introduction to Cryptography CSCE 548 – Secure Software Construction Projects in other courses, e.g., CSCE 520, 416, etc. Magellan Scholar

Computer Science and Engineering 9 Global Demand for IA Workforce Worldwide: –2010: 2.28 million –2015: 4.24 million (projected) –Compound Annual Growth Rate: 13.2% Americas: –2010: 920,845 –2015: 1,785,236 –Compound Annual Growth Rate: 14.2% Information Warfare - Farkas 9

Computer Science and Engineering 10 Salary 2011 Annual salary(ISC) 2® Member/non-member Worldwide: $98,600/$78,500 Americas: $106,900/$92,900 10

Computer Science and Engineering 11 IA Jobs Job market –Civil (Join Information Systems Security Association, ISSA, ) –Government (Internship available at USC-UTS, and SC Dept. of Probation, Parole, and Pardon Services) –Military (Internship available at SPAWAR, Charleston) Education and training requirements (B.S. degree, certification, hands-on experiments) Salary FUN

Current IA News Is the FBI Any Match for Cyber Criminals?, cyber- criminals?et_cid= &et_rid= &locatio n=top#.Uo0bQydkHj4 cyber- criminals?et_cid= &et_rid= &locatio n=top#.Uo0bQydkHj4 –After 9/11: FBI shifted from organized crime to fighting terrorism –Current: counter cyber attacks Computer Science and Engineering 12

US Ponders Ways Not to Destroy Bitcoin, ways-not-destroy- bitcoin?et_cid= &et_rid= &location= top#.Uo0cjSdkHj4 ways-not-destroy- bitcoin?et_cid= &et_rid= &location= top#.Uo0cjSdkHj4 –Illegal use of bitcoin  should it be destroyed? –Over-regulation  bitcoin moves out of US control Computer Science and Engineering 13 Current IA News

NSA Vowed to Fix Its Collection Errors, its-collection-errors#.Uo0dNSdkHj4 its-collection-errors#.Uo0dNSdkHj4 –Admitted surveillance rule violations due to poor management, lack of oversight, typographical errors –Promise of safety measures Computer Science and Engineering 14 Current IA News

More News Miners Face Rising Threat of Cyber Attacks due to increased automation Cyber Deviance and Cyber Crime Start and Peak in Teen Years start around 15 and peak around 18 Five More Suspects Arrested in $45 Million Global Bank Heist – loss 45 million from ATM Chicago hacker sentenced to 10 years, “hacktivist" Jeremy Hammond explained that his cybercrimes were altruistic acts of civil disobedience Computer Science and Engineering 15

Computer Science and Engineering 16 Thank you!