Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo - PowerPoint PPT Presentation

Ava
gary golubski joshua justice andrew jarrett sorabh gupta dan gifford donna yoo l.
Skip this Video
Loading SlideShow in 5 Seconds..
Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo PowerPoint Presentation
Download Presentation
Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

play fullscreen
1 / 50
Download Presentation
Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo
332 Views
Download Presentation

Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Academic Sector: Information SectionGeorge Washington UniversityIdaho State UniversityPurdue UniversityUniversity of California at DavisNaval Postgraduate School Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

  2. General Background • Chief Technology Officer Guy Jones • Former Director of Technology • In charge of a project to replace the IT infrastructure • Full Disk Encryption of all GWU-owned computers with access to sensitive data • Banner, Oracle, DataMart, VPN • Faculty, staff, and student workers • Both laptops and desktops

  3. General Background • Student Technology Services promotes secure computing • Has security advice for students • Requires students to use Cisco Clean Access before they can use ResNet on Windows • Gives advice about online privacy (Myspace, Facebook, etc.)

  4. General Background • Information Security Services provides tech support as well as security info • Virus alerts • Antivirus • E-mail spam filtering • Computer training • IE 6 is still required for people using certain internal websites

  5. Education (Undergraduate) • B.S. in Computer Engineering and Computer Science • B.S. in CS has a security option, including courses in • Cryptography • Computer security • Network security • Information policy • B.A. in Computer Science

  6. Education (Graduate) • Master’s and Doctoral degrees available in Computer Science with a focus in Computer Security and Information Assurance • Courses in the following: • Cryptography • Wireless/Mobile security • Security principles • System security • Repeatable seminar on current research in the field

  7. Research • Five faculty members concentrating on Computer Security and Information Assurance

  8. Research • Lance J. Hoffman • Professor of Computer Science • Established the Computer Security program • Leads a scholarship program for Computer Security and Information Assurance students • Multiple publications about security • Electronic voting, trust models, cyber-security exercises, protected operating systems, privacy

  9. Research • Rahul Simha • Professor of Computer Science • CVV: Citizen Verified Voting • Publicly verifiable voting system • Open Source • Prototyped in 2004 • Uses the Chaum e-voting plan • Encrypted paper receipts

  10. Research • Jonathan Stanton • Assistant Professor of Computer Science • Also works on CVV • Focuses on scaling communications, including maintaining security • Key agreement in widespread systems • Authentication frameworks in client-server • Moving beyond “peer-to-peer” communication

  11. Research • Poorvi Vora • Assistant Professor of Computer Science • Also works on CVV • Analyzes privacy using game theory • Cryptanalysis

  12. Research • Sead Muftic • Professor of Computer Science • Author of multiple security textbooks

  13. Outreach (Alliances and Partnerships) • Partners with Dell and Apple to get a standard image and pre-configured computers as well as lower prices • Computers are not mandatory for GWU students • Preconfigured computers come with Symantec Anti-Virus

  14. Outreach (Alliances and Partnerships) • America Online • Anthrotronix, Inc. • Endocare • Jones Day • Nortel Networks • UT-Batelle, LLC • National Defense University • Trident Systems • National Science Foundation • Department of Commerce • Department of Defense • Department of Health and Human Services • U.S. Navy • Integrated Justice Information Systems Institute, Inc.

  15. Outreach (Alliances and Partnerships) • Universities • Alabama Agricultural And Mechanical University • George Mason University • Georgia Institute Of Technology • University Of California/Irvine

  16. General Background • 13,000 students enrolled • Located in Pocatello, Idaho • Over 280 programs • Designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency

  17. Education (Undergraduate) • B.S. Computer Science • Minor in Computer Science • No formal security track • Can take classes with in CS • Computer Security & Cryptography

  18. Education (Graduate) • No formal Master's or PhD Security program • M.S. in Electrical and Computer Science and Engineering • Proposed March 2007 • Still under development • PhD in Engineering and Applied Science • Research areas include Computer Science

  19. Research • National Information Assurance Training & Education Center (NIATEC) • Director: Dr. Corey Schou • Students research in computer security • Outreaches to government internships

  20. Research • Cory Schou • Director of NIATEC • Works closely w/ senior management at: • Apple • Microsoft • United Airlines • Research interests include info security & privacy

  21. Research • Rich Lundeen • Professor of Computer Science • System Administrator • Areas of interest include Computer Security • Teaches Computer Security & Cryptography

  22. General Background • Located in West Lafayette, Indiana • Academic Analytics and The Chronicle of Higher Education's 2007 Top Research Universities Faculty Scholarly Productivity Index • Information Security (CERIAS) #1 • Information Technology/Information Systems (CERIAS) #2 • Computational Science #5 • Computer Systems and Software Engineering #17. • Association for Computing Machinery • Computer Science #9

  23. General Background • Scholarship for Service • Full tuition and fees for 2 years while the recipient pursues an MS degree with specialization in security • Covers lodging and pays a monthly stipend, plus a summer internship • In return, the recipient is expected to make satisfactory progress towards the degree • Upon graduation, the student will be required to take a job with the Federal government for as many years as the student received the scholarship

  24. Education (Graduate) • Degree programs • MS Information Security (Interdisciplinary) (2000); PhD Information Security (Interdisciplinary) (2006) • Department of Philosophy • Department of Communication • School of Technology • Specialization • Cyber Forensics (Graduate) (2007)

  25. Research • Center for Education and Research in Information Assurance and Security (CERIAS) • Research center and not an academic department • Does not offer degrees • Programs allow a degree and to be associated with CERIAS • Viewed as one of the world’s leading centers for research and education in areas of information security • CERIAS is unique among such national centers in its multidisciplinary approach

  26. Research • CERIAS includes faculty from six different colleges and 20+ departments across campus • Research focus areas: • Risk Management, Policies, and Laws • Trusted Social and Human Interactions • Security Awareness, Education, and Training • Assurable Software and Architectures • Enclave and Network Security • Incident Detection, Response, and Investigation • Identification, Authentication, and Privacy • Cryptology and Rights Management

  27. Research • Current Projects • New Product Design Risk Assessment • A High Assurance, High Capacity Platform for Information Operations • Purdue University Regional Visualization and Analytics Center • A Framework for Managing the Assured Information Sharing Lifecycle • An Integrated and Utility-Centric Framework for Federated Text Search

  28. Research • Annual Security Symposium March 24-25 2009 • 2008 • Virtually Secure or Securely Virtual? • CERIAS; Configuresoft • Wireless: Can You Secure Me Now? • CS, Purdue; Motorola • Malware and Trojans and Intrusions…Oh My! • ECE, Purdue; McAfee; Lockheed Martin; MITRE • Finance & Healthcare: The Same; But Different • RCHE, Purdue; CS, Purdue; HP Labs

  29. Research • Cyber Forensics Lab • Mission: education and training; applied and basic research; investigative support. • Extend to law enforcement, military, private sector, and academia. • Mobile Forensics World Conference, Chicago, May 26-30, 2009 • FBI Cyber Crime Task Force

  30. Research Charles Pfleeger

  31. Outreach (Alliances and Partnerships) • Configuresoft • HP Labs • Lockheed Martin • McAfee • Mitre • Motorola • National Colloquium Information Systems Security Education (NCISSE) • Software Engineering Research Center (SERC) • National White Collar Crime Center (NW3C)

  32. University of California, Davis

  33. General Background • Has around 30,000 students • Located 15 miles west of Sacramento • Ranked 11th by "U.S. News and World Report" for public universities

  34. Education (Undergraduate) • No formal Computer Security degree program • Computer Science is the closest degree • Able to take some electives that relate to the field • Undergraduate Computer Security Courses • Computer Security • Computer Security for Non-Majors • Other related courses: • Number Theory • Computer Networks

  35. Education (Graduate) • No formal PhD degree in Computer Security • However, one can specialize in Computer Security: • Must be admitted to the Computer Science department • Would specialize in security research • Thesis would be about Computer Security • Would receive a PhD in Computer Science • Graduate CS program has less than 100 students

  36. Education (Graduate) • Graduate Computer Security Courses • Modern Cryptography • Cryptography for E-Commerce • Computer and Information Security • Foundations of Computer and Information Security • Computer Security: Intrusion Detection Based Approach

  37. Research • Ranks in the top 15 U.S. universities in research funding • UCD Computer Security Laboratory • Designated by NSA as a Center of Academic Excellence in Information Assurance Education in 1999

  38. Research • Balancing Privacy and Analysis in Data Sanitization • Vulnerabilities Analysis • Secure Programming Clinic • Forensic Logging and Auditing • E-Voting Research

  39. Outreach (Alliances and Partnerships) • Microsoft Research • Intel • Sprint Lab • Oracle • Pixar • HP Labs • Lawrence Livermore National Lab • Sandia • Motorola Lab • XDx • BEA • IBM Research • McAfee

  40. Naval Post Graduate School

  41. General Background • Located in Monterey, California • 1500 students (entire campus) • Must be a federal employee to gain admission • Almost all graduates are Naval Officers who return to active duty after graduation • Free for military officers, scholarships available for civilians

  42. Education • Center for Information Systems Security Studies and Research • MS (2 years) • PhD (3 additional years) • Certifications Offered • CISSP • Various CNSS (NSA) certifications • Specializations • Security Requirements and Analysis, Computer Network Operations, Exploitation and Crime, Forensics, Intrusion Detection and Response, and Network Security

  43. Research • Cutting edge research that includes a wide area of topics • Mobile computing • Real time systems hacking • Building trusted interactive usable computing systems • Security domain models • Security architecture systems • Creating certifications for entire organizational units after a thorough auditing process

  44. Outreach (Alliances and Partnerships) • Department of Defense • DARPA • NSA • NSF • Air Force Institute of Technology • Office of Naval Research • Space and Naval Warfare Systems Command • Information Processing Technology Office • Microsoft • BAE Systems • Cisco • Federal Aviation Administration • National Reconnaissance Office • Navy Modeling and Simulation Office • Defense Information Systems Agency • Missile Defense Agency

  45. Comparison of Schools

  46. Comparison of Schools

  47. Sources • http://www.cs.gwu.edu/ • http://www.cerias.purdue.edu/ • http://www.cyberforensics.purdue.edu/ • http://www.cerias.purdue.edu/site/education/graduate_program/ • http://www.cerias.purdue.edu/site/education/graduate_program/sfs/ • http://engr.isu.edu/pages/computer-science.php • http://www.cs.ucdavis.edu/ • http://www.nps.edu/Academics/GSEAS/index.html