E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

CISSP Seeks CIPP Object: Mutual Compliance Marriage of Privacy and Security Professionals Under HIPAA David B. Nelson, CISSP Yolo County Woodland, California.
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Ethics, Privacy and Information Security
Security and Personnel
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Gerald M. Santoro, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA (slides.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
1 Telstra in Confidence Managing Security for our Mobile Technology.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
E-Commerce Security and Fraud Issues and Protections
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security Certification
CYBER CRIME AND SECURITY TRENDS
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Certification and Training Presented by Sam Jeyandran.
CIO Training Model Pravit Khaemasunun College of Innovation Thammasat University.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Assessment Presentation Philip Robbins - July 14, 2012 University of Phoenix Hawaii Campus Fundamentals of Information Systems Security.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Cyber Security & Fraud – The impact on small businesses.
IS Network and Telecommunications Risks Chapter Six.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Associate of Applied Science Degree Information & Telecommunication Technology Scott edu
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
University education Center affiliated to the University of Barcelona.
S ECURE E-S YSTEMS AS A COMPETITIVE ADVANTAGE IN A GLOBAL MARKETS By Cade Zvavanjanja Cybersecurity Strategist By Cade Zvavanjanja Cybersecurity Strategist.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Securing Information Systems
Mission Davenport University prepares and transforms students to achieve the highest levels of academic performance, leading them to excel and advance.
Capabilities Matrix Access and Authentication
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Securing Information Systems
Information Security at Florida State University
Information Security at Florida State University
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
5G Security Training
E-Commerce Security and Fraud Issues and Protections
Information Security at Florida State University
Information Security at Florida State University
INFORMATION SYSTEMS SECURITY and CONTROL
Information Assurance & Network Security Certificate
Information Services Security Management
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Information Technology Offerings: Presented at Security.ac.nz
Presentation transcript:

E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering

Viruses Denial of Service Hacker Intrusion Natural Disasters System Failure Theft of sensitive Information Social Engineering Lost Backup supports Stolen Laptop Industrial Espionage Malicious and Self-propagating Codes Insiders abuse

22% 9% 69%65% Percentage of organizations that experienced one or more security incidents Percentage breakdown of the number of cyber security incidents experienced by organizations 21% 9% 5% Statistics from the 2012 Cyber Crime and Security Survey

Types of incidents experienced in 2012 Security technology used in 2012

Organizations that increased their expenditure on IT Security in % 42% 6%

Engineering studies in Telecommunications Security Instruct the next-generation of security engineers. Learn techniques, methodologies, policies, strategies, and procedures related to communication and information security. Prepare for a challenging career in the global Telecommunications security field.

Competences to develop Cryptographic techniques and protocols Distributed Security techniques Assurance and Secure Operations Network security prevention Operating systems security Intrusion detection and response National and international cyber ethics and law Communication security forensics Computer and Web Security Wireless and mobile security Strategic intelligence

Expert and consultant in communication security Design, development, deployment, and management of security solutions Security and network administration and planning Security audit, verification, and assessment Incident response and risk assessment Your future job

An opportunity to take contact with industrial partners A course of seminars will be given by leading security experts from the industry An academic program shaped to the national and international industrial requirements, including certifications Security ethics and policy aspects, are also studied, focusing also on national and international regulations

Competitiveness Conformance to the need to make available well trained engineers at the international level The Program is close to those provided at the master level in several American universities : – Purdue University – James Madison University – John Hopkins university – Carnegie Mellon University. – … Some courses will be taught in English

Applied cryptography (21 H) Operating system security (21 H) Network defense and countermeasures (21 H) Information security assurance (21 H) Optional courses (ComSec) Semester IV

Teaching UnitCoursesDuration Wireless Security Wireless communications42 H Security of mobile and wireless networks42 H Networks and Services Protection Intrusion detection21 H E-commerce security21 H Security protocols analysis and validation42 H Intrusions Response techniques Computer and Network forensics42 H Security audit and compliance testing21 H Industrial and academic issues Advanced issues in network security21 H Seminar on public and private security issues21 H Cisco security certification21 H Security and Enterprise Management Strategic intelligence and digital security21 H Security legal issues21 H Projects management21 H Economics of network security21 H Total378 H Mandatory courses (TelSec) Semester V