gary golubski joshua justice andrew jarrett sorabh gupta dan gifford donna yoo l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo PowerPoint Presentation
Download Presentation
Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

Loading in 2 Seconds...

play fullscreen
1 / 50

Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo - PowerPoint PPT Presentation


  • 323 Views
  • Uploaded on

Academic Sector: Information Section George Washington University Idaho State University Purdue University University of California at Davis Naval Postgraduate School Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo General Background

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo' - Ava


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
gary golubski joshua justice andrew jarrett sorabh gupta dan gifford donna yoo

Academic Sector: Information SectionGeorge Washington UniversityIdaho State UniversityPurdue UniversityUniversity of California at DavisNaval Postgraduate School

Gary Golubski

Joshua Justice

Andrew Jarrett

Sorabh Gupta

Dan Gifford

Donna Yoo

general background
General Background
  • Chief Technology Officer Guy Jones
    • Former Director of Technology
      • In charge of a project to replace the IT infrastructure
  • Full Disk Encryption of all GWU-owned computers with access to sensitive data
    • Banner, Oracle, DataMart, VPN
    • Faculty, staff, and student workers
    • Both laptops and desktops
general background4
General Background
  • Student Technology Services promotes secure computing
    • Has security advice for students
    • Requires students to use Cisco Clean Access before they can use ResNet on Windows
    • Gives advice about online privacy (Myspace, Facebook, etc.)
general background5
General Background
  • Information Security Services provides tech support as well as security info
    • Virus alerts
    • Antivirus
    • E-mail spam filtering
    • Computer training
  • IE 6 is still required for people using certain internal websites
education undergraduate
Education (Undergraduate)
  • B.S. in Computer Engineering and Computer Science
    • B.S. in CS has a security option, including courses in
      • Cryptography
      • Computer security
      • Network security
      • Information policy
  • B.A. in Computer Science
education graduate
Education (Graduate)
  • Master’s and Doctoral degrees available in Computer Science with a focus in Computer Security and Information Assurance
  • Courses in the following:
    • Cryptography
    • Wireless/Mobile security
    • Security principles
    • System security
    • Repeatable seminar on current research in the field
research
Research
  • Five faculty members concentrating on Computer Security and Information Assurance
research9
Research
  • Lance J. Hoffman
    • Professor of Computer Science
    • Established the Computer Security program
    • Leads a scholarship program for Computer Security and Information Assurance students
    • Multiple publications about security
      • Electronic voting, trust models, cyber-security exercises, protected operating systems, privacy
research10
Research
  • Rahul Simha
    • Professor of Computer Science
    • CVV: Citizen Verified Voting
      • Publicly verifiable voting system
      • Open Source
      • Prototyped in 2004
      • Uses the Chaum e-voting plan
      • Encrypted paper receipts
research11
Research
  • Jonathan Stanton
    • Assistant Professor of Computer Science
    • Also works on CVV
    • Focuses on scaling communications, including maintaining security
      • Key agreement in widespread systems
      • Authentication frameworks in client-server
      • Moving beyond “peer-to-peer” communication
research12
Research
  • Poorvi Vora
    • Assistant Professor of Computer Science
    • Also works on CVV
    • Analyzes privacy using game theory
    • Cryptanalysis
research13
Research
  • Sead Muftic
    • Professor of Computer Science
    • Author of multiple security textbooks
outreach alliances and partnerships
Outreach (Alliances and Partnerships)
  • Partners with Dell and Apple to get a standard image and pre-configured computers as well as lower prices
    • Computers are not mandatory for GWU students
  • Preconfigured computers come with Symantec Anti-Virus
outreach alliances and partnerships15
Outreach (Alliances and Partnerships)
  • America Online
  • Anthrotronix, Inc.
  • Endocare
  • Jones Day
  • Nortel Networks
  • UT-Batelle, LLC
  • National Defense University
  • Trident Systems
  • National Science Foundation
  • Department of Commerce
  • Department of Defense
  • Department of Health and Human Services
  • U.S. Navy
  • Integrated Justice Information Systems Institute, Inc.
outreach alliances and partnerships16
Outreach (Alliances and Partnerships)
  • Universities
    • Alabama Agricultural And Mechanical University
    • George Mason University
    • Georgia Institute Of Technology
    • University Of California/Irvine
general background18
General Background
  • 13,000 students enrolled
  • Located in Pocatello, Idaho
  • Over 280 programs
  • Designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency
education undergraduate19
Education (Undergraduate)
  • B.S. Computer Science
    • Minor in Computer Science
  • No formal security track
  • Can take classes with in CS
    • Computer Security & Cryptography
education graduate20
Education (Graduate)
  • No formal Master's or PhD Security program
  • M.S. in Electrical and Computer Science and Engineering
    • Proposed March 2007
    • Still under development
  • PhD in Engineering and Applied Science
    • Research areas include Computer Science
research21
Research
  • National Information Assurance Training & Education Center (NIATEC)
  • Director: Dr. Corey Schou
  • Students research in computer security
  • Outreaches to government internships
research22
Research
  • Cory Schou
    • Director of NIATEC
    • Works closely w/ senior management at:
      • Apple
      • Microsoft
      • United Airlines
      • Research interests include info security & privacy
research23
Research
  • Rich Lundeen
    • Professor of Computer Science
    • System Administrator
    • Areas of interest include Computer Security
    • Teaches Computer Security & Cryptography
general background25
General Background
  • Located in West Lafayette, Indiana
  • Academic Analytics and The Chronicle of Higher Education's 2007 Top Research Universities Faculty Scholarly Productivity Index
    • Information Security (CERIAS) #1
    • Information Technology/Information Systems (CERIAS) #2
    • Computational Science #5
    • Computer Systems and Software Engineering #17.
  • Association for Computing Machinery
    • Computer Science #9
general background26
General Background
  • Scholarship for Service
    • Full tuition and fees for 2 years while the recipient pursues an MS degree with specialization in security
    • Covers lodging and pays a monthly stipend, plus a summer internship
    • In return, the recipient is expected to make satisfactory progress towards the degree
    • Upon graduation, the student will be required to take a job with the Federal government for as many years as the student received the scholarship
education graduate27
Education (Graduate)
  • Degree programs
    • MS Information Security (Interdisciplinary) (2000); PhD Information Security (Interdisciplinary) (2006)
      • Department of Philosophy
      • Department of Communication
      • School of Technology
  • Specialization
    • Cyber Forensics (Graduate) (2007)
research28
Research
  • Center for Education and Research in Information Assurance and Security (CERIAS)
    • Research center and not an academic department
    • Does not offer degrees
    • Programs allow a degree and to be associated with CERIAS
    • Viewed as one of the world’s leading centers for research and education in areas of information security
    • CERIAS is unique among such national centers in its multidisciplinary approach
research29
Research
  • CERIAS includes faculty from six different colleges and 20+ departments across campus
  • Research focus areas:
    • Risk Management, Policies, and Laws
    • Trusted Social and Human Interactions
    • Security Awareness, Education, and Training
    • Assurable Software and Architectures
    • Enclave and Network Security
    • Incident Detection, Response, and Investigation
    • Identification, Authentication, and Privacy
    • Cryptology and Rights Management
research30
Research
  • Current Projects
    • New Product Design Risk Assessment
    • A High Assurance, High Capacity Platform for Information Operations
    • Purdue University Regional Visualization and Analytics Center
    • A Framework for Managing the Assured Information Sharing Lifecycle
    • An Integrated and Utility-Centric Framework for Federated Text Search
research31
Research
  • Annual Security Symposium March 24-25 2009
    • 2008
      • Virtually Secure or Securely Virtual?
        • CERIAS; Configuresoft
      • Wireless: Can You Secure Me Now?
        • CS, Purdue; Motorola
      • Malware and Trojans and Intrusions…Oh My!
        • ECE, Purdue; McAfee; Lockheed Martin; MITRE
      • Finance & Healthcare: The Same; But Different
        • RCHE, Purdue; CS, Purdue; HP Labs
research32
Research
  • Cyber Forensics Lab
    • Mission: education and training; applied and basic research; investigative support.
      • Extend to law enforcement, military, private sector, and academia.
    • Mobile Forensics World Conference, Chicago, May 26-30, 2009
    • FBI Cyber Crime Task Force
research33
Research

Charles Pfleeger

outreach alliances and partnerships34
Outreach (Alliances and Partnerships)
  • Configuresoft
  • HP Labs
  • Lockheed Martin
  • McAfee
  • Mitre
  • Motorola
  • National Colloquium Information Systems Security Education (NCISSE)
  • Software Engineering Research Center (SERC)
  • National White Collar Crime Center (NW3C)
general background36
General Background
  • Has around 30,000 students
  • Located 15 miles west of Sacramento
  • Ranked 11th by "U.S. News and World Report" for public universities
education undergraduate37
Education (Undergraduate)
  • No formal Computer Security degree program
  • Computer Science is the closest degree
    • Able to take some electives that relate to the field
    • Undergraduate Computer Security Courses
      • Computer Security
      • Computer Security for Non-Majors
    • Other related courses:
      • Number Theory
      • Computer Networks
education graduate38
Education (Graduate)
  • No formal PhD degree in Computer Security
  • However, one can specialize in Computer Security:
    • Must be admitted to the Computer Science department
    • Would specialize in security research
    • Thesis would be about Computer Security
    • Would receive a PhD in Computer Science
  • Graduate CS program has less than 100 students
education graduate39
Education (Graduate)
  • Graduate Computer Security Courses
    • Modern Cryptography
    • Cryptography for E-Commerce
    • Computer and Information Security
    • Foundations of Computer and Information Security
    • Computer Security: Intrusion Detection Based Approach
research40
Research
  • Ranks in the top 15 U.S. universities in research funding
  • UCD Computer Security Laboratory
  • Designated by NSA as a Center of Academic Excellence in Information Assurance Education in 1999
research41
Research
  • Balancing Privacy and Analysis in Data Sanitization
  • Vulnerabilities Analysis
  • Secure Programming Clinic
  • Forensic Logging and Auditing
  • E-Voting Research
outreach alliances and partnerships42
Outreach (Alliances and Partnerships)
  • Microsoft Research
  • Intel
  • Sprint Lab
  • Oracle
  • Pixar
  • HP Labs
  • Lawrence Livermore National Lab
  • Sandia
  • Motorola Lab
  • XDx
  • BEA
  • IBM Research
  • McAfee
general background44
General Background
  • Located in Monterey, California
  • 1500 students (entire campus)
  • Must be a federal employee to gain admission
  • Almost all graduates are Naval Officers who return to active duty after graduation
  • Free for military officers, scholarships available for civilians
education
Education
  • Center for Information Systems Security Studies and Research
    • MS (2 years)
    • PhD (3 additional years)
  • Certifications Offered
    • CISSP
    • Various CNSS (NSA) certifications
  • Specializations
    • Security Requirements and Analysis, Computer Network Operations, Exploitation and Crime, Forensics, Intrusion Detection and Response, and Network Security
research46
Research
  • Cutting edge research that includes a wide area of topics
    • Mobile computing
    • Real time systems hacking
    • Building trusted interactive usable computing systems
    • Security domain models
    • Security architecture systems
    • Creating certifications for entire organizational units after a thorough auditing process
outreach alliances and partnerships47
Outreach (Alliances and Partnerships)
  • Department of Defense
  • DARPA
  • NSA
  • NSF
  • Air Force Institute of Technology
  • Office of Naval Research
  • Space and Naval Warfare Systems Command
  • Information Processing Technology Office
  • Microsoft
  • BAE Systems
  • Cisco
  • Federal Aviation Administration
  • National Reconnaissance Office
  • Navy Modeling and Simulation Office
  • Defense Information Systems Agency
  • Missile Defense Agency
sources
Sources
  • http://www.cs.gwu.edu/
  • http://www.cerias.purdue.edu/
  • http://www.cyberforensics.purdue.edu/
  • http://www.cerias.purdue.edu/site/education/graduate_program/
  • http://www.cerias.purdue.edu/site/education/graduate_program/sfs/
  • http://engr.isu.edu/pages/computer-science.php
  • http://www.cs.ucdavis.edu/
  • http://www.nps.edu/Academics/GSEAS/index.html