1 / 9

Undergraduate Technology Programs

Undergraduate Technology Programs. John Baker Johns Hopkins University Carey Business School jb@jhu.edu 410-516-8563. ‘Security’ Spectrum. Security Event. Time line. Digital Forensics : Investigation Analysis Recovery Improved preparation. Security : Planning Preparation

lee-gray
Download Presentation

Undergraduate Technology Programs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School jb@jhu.edu410-516-8563

  2. ‘Security’ Spectrum Security Event Time line • Digital Forensics: • Investigation • Analysis • Recovery • Improved preparation • Security: • Planning • Preparation • Prevention • Detection • Minimize Problem

  3. The Need • Jobs • Network Forensics ($65-$140k – MD) – Bachelor • Product Manager ($120-$150k – NY) – MS or PhD • Info Sec. Engineer (65-80/hr - CA) - ‘Contract Investigator’ • Companies • Law Enforcement (local, state and federal) • Grant Thornton • General Dynamics • Booz-Allen • SAIC • American Express

  4. ‘Computer Forensics Investigator’ • Good working knowledge of computer construction, hard drive processes, data recovery, applications and operating systems. • Understand networking, encryption, steganography and computer crime • Recover information from erased or damaged systems or media • Great deal of patience (work long hours) • Common work activities include: • Examining & recovering data from computers & storage devices • Taking apart computers and reconstructing damaged systems • Preparing reports on information found • Testifying in court about the evidence and methods • Research on computer crimes and methods used to gather evidence • Training others

  5. Carey Focus • Information Security • Prevention phase • Digital Forensics • Recovery & investigation phase • Approach • Strong business base • Knowledge of the area • Some skills • Higher-level: research, communications, critical thinking, problem solving, self-learning, team work • ‘Humanity in Mind’

  6. Program Goals • Understand the Technology • Not be an expert in the technology • Not teaching the tools • Business Technology Focus • Address Larger Issues • Self-learning • Communication • Written, Spoken • Critical thinking • Problem Solving • Research

  7. Programs • Carey Approach • Strong last 2 years • Partner with Community Colleges • Program • B. S. degree • Strong business base • Upper focus in Security or Digital Forensics

  8. Program Specifics • Transfer credits (60 – from Community College) • Carey Program (last 60 credits) • Business core (18 credits) • Skills courses (12 credits) • Required concentration courses (9 credits) • Concentration electives (9 credits) • Capstone coursework (12 credits) • Project Management, Strategic Management and Sr. Project

  9. Summer Digital Forensics Camp • Targeted to H. S. Students • Must be H. S. student in Spring 2009 • Computer skills • Goals • Generate interest in technology • Delve into the ‘innards’ of a machine • Have fun ‘investigating’ for hidden data • Understand digital investigations • Find out what not to do (security clearance later)

More Related