html5-img
1 / 50

Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

Academic Sector: Information Section George Washington University Idaho State University Purdue University University of California at Davis Naval Postgraduate School Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo General Background

Ava
Download Presentation

Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Academic Sector: Information SectionGeorge Washington UniversityIdaho State UniversityPurdue UniversityUniversity of California at DavisNaval Postgraduate School Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

  2. General Background • Chief Technology Officer Guy Jones • Former Director of Technology • In charge of a project to replace the IT infrastructure • Full Disk Encryption of all GWU-owned computers with access to sensitive data • Banner, Oracle, DataMart, VPN • Faculty, staff, and student workers • Both laptops and desktops

  3. General Background • Student Technology Services promotes secure computing • Has security advice for students • Requires students to use Cisco Clean Access before they can use ResNet on Windows • Gives advice about online privacy (Myspace, Facebook, etc.)

  4. General Background • Information Security Services provides tech support as well as security info • Virus alerts • Antivirus • E-mail spam filtering • Computer training • IE 6 is still required for people using certain internal websites

  5. Education (Undergraduate) • B.S. in Computer Engineering and Computer Science • B.S. in CS has a security option, including courses in • Cryptography • Computer security • Network security • Information policy • B.A. in Computer Science

  6. Education (Graduate) • Master’s and Doctoral degrees available in Computer Science with a focus in Computer Security and Information Assurance • Courses in the following: • Cryptography • Wireless/Mobile security • Security principles • System security • Repeatable seminar on current research in the field

  7. Research • Five faculty members concentrating on Computer Security and Information Assurance

  8. Research • Lance J. Hoffman • Professor of Computer Science • Established the Computer Security program • Leads a scholarship program for Computer Security and Information Assurance students • Multiple publications about security • Electronic voting, trust models, cyber-security exercises, protected operating systems, privacy

  9. Research • Rahul Simha • Professor of Computer Science • CVV: Citizen Verified Voting • Publicly verifiable voting system • Open Source • Prototyped in 2004 • Uses the Chaum e-voting plan • Encrypted paper receipts

  10. Research • Jonathan Stanton • Assistant Professor of Computer Science • Also works on CVV • Focuses on scaling communications, including maintaining security • Key agreement in widespread systems • Authentication frameworks in client-server • Moving beyond “peer-to-peer” communication

  11. Research • Poorvi Vora • Assistant Professor of Computer Science • Also works on CVV • Analyzes privacy using game theory • Cryptanalysis

  12. Research • Sead Muftic • Professor of Computer Science • Author of multiple security textbooks

  13. Outreach (Alliances and Partnerships) • Partners with Dell and Apple to get a standard image and pre-configured computers as well as lower prices • Computers are not mandatory for GWU students • Preconfigured computers come with Symantec Anti-Virus

  14. Outreach (Alliances and Partnerships) • America Online • Anthrotronix, Inc. • Endocare • Jones Day • Nortel Networks • UT-Batelle, LLC • National Defense University • Trident Systems • National Science Foundation • Department of Commerce • Department of Defense • Department of Health and Human Services • U.S. Navy • Integrated Justice Information Systems Institute, Inc.

  15. Outreach (Alliances and Partnerships) • Universities • Alabama Agricultural And Mechanical University • George Mason University • Georgia Institute Of Technology • University Of California/Irvine

  16. General Background • 13,000 students enrolled • Located in Pocatello, Idaho • Over 280 programs • Designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency

  17. Education (Undergraduate) • B.S. Computer Science • Minor in Computer Science • No formal security track • Can take classes with in CS • Computer Security & Cryptography

  18. Education (Graduate) • No formal Master's or PhD Security program • M.S. in Electrical and Computer Science and Engineering • Proposed March 2007 • Still under development • PhD in Engineering and Applied Science • Research areas include Computer Science

  19. Research • National Information Assurance Training & Education Center (NIATEC) • Director: Dr. Corey Schou • Students research in computer security • Outreaches to government internships

  20. Research • Cory Schou • Director of NIATEC • Works closely w/ senior management at: • Apple • Microsoft • United Airlines • Research interests include info security & privacy

  21. Research • Rich Lundeen • Professor of Computer Science • System Administrator • Areas of interest include Computer Security • Teaches Computer Security & Cryptography

  22. General Background • Located in West Lafayette, Indiana • Academic Analytics and The Chronicle of Higher Education's 2007 Top Research Universities Faculty Scholarly Productivity Index • Information Security (CERIAS) #1 • Information Technology/Information Systems (CERIAS) #2 • Computational Science #5 • Computer Systems and Software Engineering #17. • Association for Computing Machinery • Computer Science #9

  23. General Background • Scholarship for Service • Full tuition and fees for 2 years while the recipient pursues an MS degree with specialization in security • Covers lodging and pays a monthly stipend, plus a summer internship • In return, the recipient is expected to make satisfactory progress towards the degree • Upon graduation, the student will be required to take a job with the Federal government for as many years as the student received the scholarship

  24. Education (Graduate) • Degree programs • MS Information Security (Interdisciplinary) (2000); PhD Information Security (Interdisciplinary) (2006) • Department of Philosophy • Department of Communication • School of Technology • Specialization • Cyber Forensics (Graduate) (2007)

  25. Research • Center for Education and Research in Information Assurance and Security (CERIAS) • Research center and not an academic department • Does not offer degrees • Programs allow a degree and to be associated with CERIAS • Viewed as one of the world’s leading centers for research and education in areas of information security • CERIAS is unique among such national centers in its multidisciplinary approach

  26. Research • CERIAS includes faculty from six different colleges and 20+ departments across campus • Research focus areas: • Risk Management, Policies, and Laws • Trusted Social and Human Interactions • Security Awareness, Education, and Training • Assurable Software and Architectures • Enclave and Network Security • Incident Detection, Response, and Investigation • Identification, Authentication, and Privacy • Cryptology and Rights Management

  27. Research • Current Projects • New Product Design Risk Assessment • A High Assurance, High Capacity Platform for Information Operations • Purdue University Regional Visualization and Analytics Center • A Framework for Managing the Assured Information Sharing Lifecycle • An Integrated and Utility-Centric Framework for Federated Text Search

  28. Research • Annual Security Symposium March 24-25 2009 • 2008 • Virtually Secure or Securely Virtual? • CERIAS; Configuresoft • Wireless: Can You Secure Me Now? • CS, Purdue; Motorola • Malware and Trojans and Intrusions…Oh My! • ECE, Purdue; McAfee; Lockheed Martin; MITRE • Finance & Healthcare: The Same; But Different • RCHE, Purdue; CS, Purdue; HP Labs

  29. Research • Cyber Forensics Lab • Mission: education and training; applied and basic research; investigative support. • Extend to law enforcement, military, private sector, and academia. • Mobile Forensics World Conference, Chicago, May 26-30, 2009 • FBI Cyber Crime Task Force

  30. Research Charles Pfleeger

  31. Outreach (Alliances and Partnerships) • Configuresoft • HP Labs • Lockheed Martin • McAfee • Mitre • Motorola • National Colloquium Information Systems Security Education (NCISSE) • Software Engineering Research Center (SERC) • National White Collar Crime Center (NW3C)

  32. University of California, Davis

  33. General Background • Has around 30,000 students • Located 15 miles west of Sacramento • Ranked 11th by "U.S. News and World Report" for public universities

  34. Education (Undergraduate) • No formal Computer Security degree program • Computer Science is the closest degree • Able to take some electives that relate to the field • Undergraduate Computer Security Courses • Computer Security • Computer Security for Non-Majors • Other related courses: • Number Theory • Computer Networks

  35. Education (Graduate) • No formal PhD degree in Computer Security • However, one can specialize in Computer Security: • Must be admitted to the Computer Science department • Would specialize in security research • Thesis would be about Computer Security • Would receive a PhD in Computer Science • Graduate CS program has less than 100 students

  36. Education (Graduate) • Graduate Computer Security Courses • Modern Cryptography • Cryptography for E-Commerce • Computer and Information Security • Foundations of Computer and Information Security • Computer Security: Intrusion Detection Based Approach

  37. Research • Ranks in the top 15 U.S. universities in research funding • UCD Computer Security Laboratory • Designated by NSA as a Center of Academic Excellence in Information Assurance Education in 1999

  38. Research • Balancing Privacy and Analysis in Data Sanitization • Vulnerabilities Analysis • Secure Programming Clinic • Forensic Logging and Auditing • E-Voting Research

  39. Outreach (Alliances and Partnerships) • Microsoft Research • Intel • Sprint Lab • Oracle • Pixar • HP Labs • Lawrence Livermore National Lab • Sandia • Motorola Lab • XDx • BEA • IBM Research • McAfee

  40. Naval Post Graduate School

  41. General Background • Located in Monterey, California • 1500 students (entire campus) • Must be a federal employee to gain admission • Almost all graduates are Naval Officers who return to active duty after graduation • Free for military officers, scholarships available for civilians

  42. Education • Center for Information Systems Security Studies and Research • MS (2 years) • PhD (3 additional years) • Certifications Offered • CISSP • Various CNSS (NSA) certifications • Specializations • Security Requirements and Analysis, Computer Network Operations, Exploitation and Crime, Forensics, Intrusion Detection and Response, and Network Security

  43. Research • Cutting edge research that includes a wide area of topics • Mobile computing • Real time systems hacking • Building trusted interactive usable computing systems • Security domain models • Security architecture systems • Creating certifications for entire organizational units after a thorough auditing process

  44. Outreach (Alliances and Partnerships) • Department of Defense • DARPA • NSA • NSF • Air Force Institute of Technology • Office of Naval Research • Space and Naval Warfare Systems Command • Information Processing Technology Office • Microsoft • BAE Systems • Cisco • Federal Aviation Administration • National Reconnaissance Office • Navy Modeling and Simulation Office • Defense Information Systems Agency • Missile Defense Agency

  45. Comparison of Schools

  46. Comparison of Schools

  47. Sources • http://www.cs.gwu.edu/ • http://www.cerias.purdue.edu/ • http://www.cyberforensics.purdue.edu/ • http://www.cerias.purdue.edu/site/education/graduate_program/ • http://www.cerias.purdue.edu/site/education/graduate_program/sfs/ • http://engr.isu.edu/pages/computer-science.php • http://www.cs.ucdavis.edu/ • http://www.nps.edu/Academics/GSEAS/index.html

More Related