Gary golubski joshua justice andrew jarrett sorabh gupta dan gifford donna yoo
Download
1 / 50

group 3 - PowerPoint PPT Presentation


  • 313 Views
  • Updated On :

Academic Sector: Information Section George Washington University Idaho State University Purdue University University of California at Davis Naval Postgraduate School Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo General Background

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'group 3' - Ava


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Gary golubski joshua justice andrew jarrett sorabh gupta dan gifford donna yoo l.jpg

Academic Sector: Information SectionGeorge Washington UniversityIdaho State UniversityPurdue UniversityUniversity of California at DavisNaval Postgraduate School

Gary Golubski

Joshua Justice

Andrew Jarrett

Sorabh Gupta

Dan Gifford

Donna Yoo


General background l.jpg
General Background

  • Chief Technology Officer Guy Jones

    • Former Director of Technology

      • In charge of a project to replace the IT infrastructure

  • Full Disk Encryption of all GWU-owned computers with access to sensitive data

    • Banner, Oracle, DataMart, VPN

    • Faculty, staff, and student workers

    • Both laptops and desktops


General background4 l.jpg
General Background

  • Student Technology Services promotes secure computing

    • Has security advice for students

    • Requires students to use Cisco Clean Access before they can use ResNet on Windows

    • Gives advice about online privacy (Myspace, Facebook, etc.)


General background5 l.jpg
General Background

  • Information Security Services provides tech support as well as security info

    • Virus alerts

    • Antivirus

    • E-mail spam filtering

    • Computer training

  • IE 6 is still required for people using certain internal websites


Education undergraduate l.jpg
Education (Undergraduate)

  • B.S. in Computer Engineering and Computer Science

    • B.S. in CS has a security option, including courses in

      • Cryptography

      • Computer security

      • Network security

      • Information policy

  • B.A. in Computer Science


Education graduate l.jpg
Education (Graduate)

  • Master’s and Doctoral degrees available in Computer Science with a focus in Computer Security and Information Assurance

  • Courses in the following:

    • Cryptography

    • Wireless/Mobile security

    • Security principles

    • System security

    • Repeatable seminar on current research in the field


Research l.jpg
Research

  • Five faculty members concentrating on Computer Security and Information Assurance


Research9 l.jpg
Research

  • Lance J. Hoffman

    • Professor of Computer Science

    • Established the Computer Security program

    • Leads a scholarship program for Computer Security and Information Assurance students

    • Multiple publications about security

      • Electronic voting, trust models, cyber-security exercises, protected operating systems, privacy


Research10 l.jpg
Research

  • Rahul Simha

    • Professor of Computer Science

    • CVV: Citizen Verified Voting

      • Publicly verifiable voting system

      • Open Source

      • Prototyped in 2004

      • Uses the Chaum e-voting plan

      • Encrypted paper receipts


Research11 l.jpg
Research

  • Jonathan Stanton

    • Assistant Professor of Computer Science

    • Also works on CVV

    • Focuses on scaling communications, including maintaining security

      • Key agreement in widespread systems

      • Authentication frameworks in client-server

      • Moving beyond “peer-to-peer” communication


Research12 l.jpg
Research

  • Poorvi Vora

    • Assistant Professor of Computer Science

    • Also works on CVV

    • Analyzes privacy using game theory

    • Cryptanalysis


Research13 l.jpg
Research

  • Sead Muftic

    • Professor of Computer Science

    • Author of multiple security textbooks


Outreach alliances and partnerships l.jpg
Outreach (Alliances and Partnerships)

  • Partners with Dell and Apple to get a standard image and pre-configured computers as well as lower prices

    • Computers are not mandatory for GWU students

  • Preconfigured computers come with Symantec Anti-Virus


Outreach alliances and partnerships15 l.jpg
Outreach (Alliances and Partnerships)

  • America Online

  • Anthrotronix, Inc.

  • Endocare

  • Jones Day

  • Nortel Networks

  • UT-Batelle, LLC

  • National Defense University

  • Trident Systems

  • National Science Foundation

  • Department of Commerce

  • Department of Defense

  • Department of Health and Human Services

  • U.S. Navy

  • Integrated Justice Information Systems Institute, Inc.


Outreach alliances and partnerships16 l.jpg
Outreach (Alliances and Partnerships)

  • Universities

    • Alabama Agricultural And Mechanical University

    • George Mason University

    • Georgia Institute Of Technology

    • University Of California/Irvine


General background18 l.jpg
General Background

  • 13,000 students enrolled

  • Located in Pocatello, Idaho

  • Over 280 programs

  • Designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency


Education undergraduate19 l.jpg
Education (Undergraduate)

  • B.S. Computer Science

    • Minor in Computer Science

  • No formal security track

  • Can take classes with in CS

    • Computer Security & Cryptography


Education graduate20 l.jpg
Education (Graduate)

  • No formal Master's or PhD Security program

  • M.S. in Electrical and Computer Science and Engineering

    • Proposed March 2007

    • Still under development

  • PhD in Engineering and Applied Science

    • Research areas include Computer Science


Research21 l.jpg
Research

  • National Information Assurance Training & Education Center (NIATEC)

  • Director: Dr. Corey Schou

  • Students research in computer security

  • Outreaches to government internships


Research22 l.jpg
Research

  • Cory Schou

    • Director of NIATEC

    • Works closely w/ senior management at:

      • Apple

      • Microsoft

      • United Airlines

      • Research interests include info security & privacy


Research23 l.jpg
Research

  • Rich Lundeen

    • Professor of Computer Science

    • System Administrator

    • Areas of interest include Computer Security

    • Teaches Computer Security & Cryptography


General background25 l.jpg
General Background

  • Located in West Lafayette, Indiana

  • Academic Analytics and The Chronicle of Higher Education's 2007 Top Research Universities Faculty Scholarly Productivity Index

    • Information Security (CERIAS) #1

    • Information Technology/Information Systems (CERIAS) #2

    • Computational Science #5

    • Computer Systems and Software Engineering #17.

  • Association for Computing Machinery

    • Computer Science #9


General background26 l.jpg
General Background

  • Scholarship for Service

    • Full tuition and fees for 2 years while the recipient pursues an MS degree with specialization in security

    • Covers lodging and pays a monthly stipend, plus a summer internship

    • In return, the recipient is expected to make satisfactory progress towards the degree

    • Upon graduation, the student will be required to take a job with the Federal government for as many years as the student received the scholarship


Education graduate27 l.jpg
Education (Graduate)

  • Degree programs

    • MS Information Security (Interdisciplinary) (2000); PhD Information Security (Interdisciplinary) (2006)

      • Department of Philosophy

      • Department of Communication

      • School of Technology

  • Specialization

    • Cyber Forensics (Graduate) (2007)


Research28 l.jpg
Research

  • Center for Education and Research in Information Assurance and Security (CERIAS)

    • Research center and not an academic department

    • Does not offer degrees

    • Programs allow a degree and to be associated with CERIAS

    • Viewed as one of the world’s leading centers for research and education in areas of information security

    • CERIAS is unique among such national centers in its multidisciplinary approach


Research29 l.jpg
Research

  • CERIAS includes faculty from six different colleges and 20+ departments across campus

  • Research focus areas:

    • Risk Management, Policies, and Laws

    • Trusted Social and Human Interactions

    • Security Awareness, Education, and Training

    • Assurable Software and Architectures

    • Enclave and Network Security

    • Incident Detection, Response, and Investigation

    • Identification, Authentication, and Privacy

    • Cryptology and Rights Management


Research30 l.jpg
Research

  • Current Projects

    • New Product Design Risk Assessment

    • A High Assurance, High Capacity Platform for Information Operations

    • Purdue University Regional Visualization and Analytics Center

    • A Framework for Managing the Assured Information Sharing Lifecycle

    • An Integrated and Utility-Centric Framework for Federated Text Search


Research31 l.jpg
Research

  • Annual Security Symposium March 24-25 2009

    • 2008

      • Virtually Secure or Securely Virtual?

        • CERIAS; Configuresoft

      • Wireless: Can You Secure Me Now?

        • CS, Purdue; Motorola

      • Malware and Trojans and Intrusions…Oh My!

        • ECE, Purdue; McAfee; Lockheed Martin; MITRE

      • Finance & Healthcare: The Same; But Different

        • RCHE, Purdue; CS, Purdue; HP Labs


Research32 l.jpg
Research

  • Cyber Forensics Lab

    • Mission: education and training; applied and basic research; investigative support.

      • Extend to law enforcement, military, private sector, and academia.

    • Mobile Forensics World Conference, Chicago, May 26-30, 2009

    • FBI Cyber Crime Task Force


Research33 l.jpg
Research

Charles Pfleeger


Outreach alliances and partnerships34 l.jpg
Outreach (Alliances and Partnerships)

  • Configuresoft

  • HP Labs

  • Lockheed Martin

  • McAfee

  • Mitre

  • Motorola

  • National Colloquium Information Systems Security Education (NCISSE)

  • Software Engineering Research Center (SERC)

  • National White Collar Crime Center (NW3C)



General background36 l.jpg
General Background

  • Has around 30,000 students

  • Located 15 miles west of Sacramento

  • Ranked 11th by "U.S. News and World Report" for public universities


Education undergraduate37 l.jpg
Education (Undergraduate)

  • No formal Computer Security degree program

  • Computer Science is the closest degree

    • Able to take some electives that relate to the field

    • Undergraduate Computer Security Courses

      • Computer Security

      • Computer Security for Non-Majors

    • Other related courses:

      • Number Theory

      • Computer Networks


Education graduate38 l.jpg
Education (Graduate)

  • No formal PhD degree in Computer Security

  • However, one can specialize in Computer Security:

    • Must be admitted to the Computer Science department

    • Would specialize in security research

    • Thesis would be about Computer Security

    • Would receive a PhD in Computer Science

  • Graduate CS program has less than 100 students


Education graduate39 l.jpg
Education (Graduate)

  • Graduate Computer Security Courses

    • Modern Cryptography

    • Cryptography for E-Commerce

    • Computer and Information Security

    • Foundations of Computer and Information Security

    • Computer Security: Intrusion Detection Based Approach


Research40 l.jpg
Research

  • Ranks in the top 15 U.S. universities in research funding

  • UCD Computer Security Laboratory

  • Designated by NSA as a Center of Academic Excellence in Information Assurance Education in 1999


Research41 l.jpg
Research

  • Balancing Privacy and Analysis in Data Sanitization

  • Vulnerabilities Analysis

  • Secure Programming Clinic

  • Forensic Logging and Auditing

  • E-Voting Research


Outreach alliances and partnerships42 l.jpg
Outreach (Alliances and Partnerships)

  • Microsoft Research

  • Intel

  • Sprint Lab

  • Oracle

  • Pixar

  • HP Labs

  • Lawrence Livermore National Lab

  • Sandia

  • Motorola Lab

  • XDx

  • BEA

  • IBM Research

  • McAfee



General background44 l.jpg
General Background

  • Located in Monterey, California

  • 1500 students (entire campus)

  • Must be a federal employee to gain admission

  • Almost all graduates are Naval Officers who return to active duty after graduation

  • Free for military officers, scholarships available for civilians


Education l.jpg
Education

  • Center for Information Systems Security Studies and Research

    • MS (2 years)

    • PhD (3 additional years)

  • Certifications Offered

    • CISSP

    • Various CNSS (NSA) certifications

  • Specializations

    • Security Requirements and Analysis, Computer Network Operations, Exploitation and Crime, Forensics, Intrusion Detection and Response, and Network Security


Research46 l.jpg
Research

  • Cutting edge research that includes a wide area of topics

    • Mobile computing

    • Real time systems hacking

    • Building trusted interactive usable computing systems

    • Security domain models

    • Security architecture systems

    • Creating certifications for entire organizational units after a thorough auditing process


Outreach alliances and partnerships47 l.jpg
Outreach (Alliances and Partnerships)

  • Department of Defense

  • DARPA

  • NSA

  • NSF

  • Air Force Institute of Technology

  • Office of Naval Research

  • Space and Naval Warfare Systems Command

  • Information Processing Technology Office

  • Microsoft

  • BAE Systems

  • Cisco

  • Federal Aviation Administration

  • National Reconnaissance Office

  • Navy Modeling and Simulation Office

  • Defense Information Systems Agency

  • Missile Defense Agency




Sources l.jpg
Sources

  • http://www.cs.gwu.edu/

  • http://www.cerias.purdue.edu/

  • http://www.cyberforensics.purdue.edu/

  • http://www.cerias.purdue.edu/site/education/graduate_program/

  • http://www.cerias.purdue.edu/site/education/graduate_program/sfs/

  • http://engr.isu.edu/pages/computer-science.php

  • http://www.cs.ucdavis.edu/

  • http://www.nps.edu/Academics/GSEAS/index.html


ad