Cybersecurity Curricular Guidelines

Size: px
Start display at page:

Download "Cybersecurity Curricular Guidelines"

Transcription

1 Cybersecurity Curricular Guidelines Ma2 Bishop, University of California Davis, co-chair Diana Burley The George Washington University, co-chair Sco2 Buck, Intel Corp. Joseph J. Ekstrom, Brigham Young University Lynn Futcher, Nelson Mandela Metropolitan University David Gibson, United States Air Force Academy Elizabeth K. Hawthorne, Union County College Siddharth Kaza, Towson University Yair Levy, Nova Southeastern University Herbert Ma2ord, Kennesaw State University Allen Parrish, United States Naval Academy 1

2 Background What should a cybersecurity professional know and what skills should they have? Disagreement due to nature of cybersecurity Used in many different roles Encompasses many disciplines Indeed, many different defini[ons of cybersecurity 2

3 Joint Task Force Assembled by ACM, IEEE_Computer Society, AIG Special Interest Group on Security, IFIP WG 11.8 Goal: to develop cybersecurity curricular guidelines for undergraduate programs that emphasize different areas of specializa[on Not curriculum development! Ins[tu[ons can use it as a basis for developing curricula, cer[fica[on requirements, though 3

4 What Is Cybersecurity? A compu[ng-based discipline involving technology, people, informa[on, and processes to enable assured opera[ons. It involves the crea[on, opera[on, analysis, and tes[ng of secure computer systems. It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries. CSEC 2017 report, p. 10 4

5 Bases for Guidelines Cybersecurity educa[on programs should: Be based on core knowledge and skills; Have a compu[ng-based founda[on Teach concepts applicable to a broad range of cybersecurity exper[se; Emphasize ethical obliga[ons and responsibili[es; and Be flexible so programs can tailor their curriculum to any specialized needs 5

6 The Model 6

7 Knowledge Areas The subject ma2er of cybersecurity Each KA composed of Knowledge Units These describe the set of topics and what students should know about them 7

8 Knowledge Areas KAs meet 3 criteria: 1. The area is important for mul[ple disciplines; 2. The area provides a tool for understanding or exploring cybersecurity ideas; and 3. The material in the area can be learned in varying levels of detail and understanding over [me. 8

9 The Knowledge Areas Data Security Soiware Security System Security Human Security Organiza[onal Security Societal Security 9

10 Overlap Note a Knowledge Unit may be put into more than one KA Example: design of a library that grabs and processes packets Soiware security KA: assurance ques[on is how packets are protected and properly read System security KA: composi[on of components, as library interface [es network to system 10

11 Example: Soiware Security CSEC2017 Knowledge Units: Fundamental design principles Prac[ce Documenta[on 11

12 Example: Soiware Security Original (in CSEC2017 Drai) KU: fundamental design principles Separa[on (of domains) Isola[on Encapsula[on Least Privilege Simplicity (of design) Minimiza[on (of implementa[on) Fail Safe Defaults Fail Secure Modularity Layering Least Astonishment Open Design Usability End-to-End Security Defense in Depth Working Group Modifica[ons KU: fundamental design principles Simplicity principles: Economy of mechanism Minimize shared mechanisms Least astonishment Restric[ve principles: Least privilege Fail-safe defaults Complete media[on Separa[on Minimize trust Methodology principles: Open design Layering Abstrac[on Complete linkage Design for itera[on 12

13 Example: Topic Valida[on Mapped against a number of widely accepted lists of soiware problems Avoiding the Top 10 Soiware Security Design Flaws: IEEE Cyber Security OWASP Top 10 Most Cri[cal Web Applica[on Security Risks 13

14 Example: Data Security KA Knowledge Units: Cryptography Digital Forensics Data Integrity and Authen[ca[on Access Control Secure Communica[on Protocols Cryptanalysis Privacy Informa[on Storage Security csec2017.org 14

15 Example: Cryptography (KU) Topics 15

16 Cross-Cupng Concepts Framework for making connec[ons among KAs, unifying underlying ideas Fundamental to students abili[es to understand core ideas through any disciplinary lens They span most, if not all, of the KAs 16

17 The Concepts Confiden[ality: property defined by rules controlling spread of informa[on Why? Key component of data security, systems security, organiza[onal security Also component of human security in guise of privacy And societal security from the combina[on of all these 17

18 The Concepts Integrity Key component: assurance Availability Accessibility not enough; must meet any stated QoS Risk Func[on of probability of threat being realized and damage incurred should this happen Adversarial Thinking Requires understanding what threats will compromise en[ty, how to make them happen 18

19 Disciplinary Lens KAs are common to all cybersecurity Depth, approach that folks are expected to know varies depending on how they will use that knowledge We use ACM disciplines 19

20 The Disciplines Computer Science Computer Engineering Informa[on Systems Informa[on Technology Soiware Engineering Mixed Disciplinary 20

21 Guidelines and Professional Prac[ce Linked through seven applica[on areas Workforce frameworks can codify their bodies of knowledge by going from the applica[on areas back to the model Then extract both core knowledge, cross-cupng concepts they find appropriate View them through the appropriate disciplinary lens These areas allow the defini[on of competency levels for each area 21

22 Applica[on Areas Public policy Procurement Management IT security opera[ons Soiware development Enterprise architecture Research 22

23 Conclusion CSEC2017 is a basis for curricula, and is not itself a curriculum CSEC2017 s[ll under development 15 community engagement efforts so far 6 working groups composed of experts not on the task force Global surveys of cybersecurity experts and educators Web site for submipng comments is h2p:// 23

24 Acknowledgements Based upon work funded by the following: Na[onal Science Founda[on Grant No. DGE Na[onal Security Agency s CNAP Curriculum Development Effort (RFI ) ACM Educa[on Board Intel Corpora[on We thank them for their support And we thank all those who have been involved, and will be involved, in the KA working groups 24

25 Web Site h2ps:// Current version is Drai 0.75, released yesterday!!!!! Comment period open un[l July 3 Then we revise it... June 14, 2017 CISSE

26 A Contrarian View The future, according to some scien[sts, will be exactly like the past, only far more expensive John Sladek Slide #26

Cybersecurity Curricula 2017

Cybersecurity Curricula 2017 Cybersecurity 0 January 0 Public Review and Comment period: January February, 0 Provide feedback at: http://csec0.org 0 0 Cybersecurity Curricula 0 Curriculum Guidelines for Undergraduate Degree Programs

More information

Strengthening Cybersecurity Workforce Development December 2017

Strengthening Cybersecurity Workforce Development December 2017 Strengthening Cybersecurity Workforce Development December 2017 Agenda 1. Introduc3ons SANS GIAC Team 2. Goal: 2017 Execu3ve Order 3. SANS GIAC NICE Workforce Framework (NCWF) Mapping Overview 4. Workforce

More information

CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER

CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER San Jose State University October 1,2014 Presented by: Jim Merrifield, IGP, CIP, ERMs Jim Merrifield, IGP, CIP, ERMs Director of Informa.on Governance

More information

Software Assurance Education Overview

Software Assurance Education Overview Software Assurance Education Overview Nancy Mead June 2011 ABSTRACT: Complex software systems affect nearly every aspect of our lives, in areas such as defense, government, energy, communication, transportation,

More information

GDPR ESSENTIALS END-USER COMPLIANCE TRAINING. Copyright 2018 Logical Operations, Inc. All rights reserved.

GDPR ESSENTIALS END-USER COMPLIANCE TRAINING. Copyright 2018 Logical Operations, Inc. All rights reserved. GDPR ESSENTIALS END-USER COMPLIANCE TRAINING 1 POTENTIAL MAXIMUM GDPR PENALTY 2 WHAT IS DATA PRIVACY? MOST NOTABLE US/CA PRIVACY LAWS Federal Trade Commission Act, Sec4on 5 California Online Privacy Protec4on

More information

Making Research Data Public: Why, What, and How. Fall 2016

Making Research Data Public: Why, What, and How. Fall 2016 Making Research Data Public: Why, What, and How Fall 2016 Research Data Service (RDS) The Research Data Service provides the Illinois research community with exper:se, tools, and infrastructure to manage

More information

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation

More information

COSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan

COSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan COSC 310: So*ware Engineering Dr. Bowen Hui University of Bri>sh Columbia Okanagan 1 Admin A2 is up Don t forget to keep doing peer evalua>ons Deadline can be extended but shortens A3 >meframe Labs This

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

The Ins(tute of Financial Opera(ons Cer(fica(on Programs

The Ins(tute of Financial Opera(ons Cer(fica(on Programs The Ins(tute of Financial Opera(ons Cer$fied Accounts Payable Professional (CAPP) Cer$fied Accounts Payable Associate (CAPA) by Lorraine Creek, BS, CAPP, CTE / Chair, Cer$fica$on CommiBee CAPP and CAPA

More information

Introduction to Securing Critical Infrastructure

Introduction to Securing Critical Infrastructure Her kan tekst skrives Her kan tekst skrives Introduction to Securing Critical Infrastructure Her kan tekst skrives Keith Frederick CISSP, CAP, CRISC, Author securenok.com Topics A)acks on the Oil and Gas

More information

Revising the MSIS Curriculum: Specifying Graduate Competencies

Revising the MSIS Curriculum: Specifying Graduate Competencies Revising the MSIS Curriculum: Specifying Graduate Competencies Second Public Deliverable of the ACM/AIS MSIS 2016 Task Force March 21, 2016 Topi, Heikki (Bentley University; ACM, co-chair; htopi@bentley.edu)

More information

Business Case Components

Business Case Components How to Build A SOC Agenda Mission Business Case Components Regulatory requirements SOC Terminology Technology Components Events categories Staff Requirements Organiza>on s Considera>ons Training Requirements

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Vendor Management: SSAE 18. Presented by Joseph Kirkpatrick CISSP, CISA, CGEIT, CRISC, QSA Managing Partner

Vendor Management: SSAE 18. Presented by Joseph Kirkpatrick CISSP, CISA, CGEIT, CRISC, QSA Managing Partner Vendor Management: SSAE 18 Presented by Joseph Kirkpatrick CISSP, CISA, CGEIT, CRISC, QSA Managing Partner Audio Handouts Questions Welcome Joseph Kirkpatrick is the Managing Partner at KirkpatrickPrice

More information

Information Assurance and Security in the ACM/IEEE CS2013

Information Assurance and Security in the ACM/IEEE CS2013 Information Assurance and Security in the ACM/IEEE CS2013 Ronald C Dodge United States Military Academy, West Point, NY, USA ronald.dodge@usma.edu Abstract. The ACM/IEEE Computing Curriculum 2013 is a

More information

CURRICULUM The Architectural Technology and Construction. programme

CURRICULUM The Architectural Technology and Construction. programme CURRICULUM The Architectural Technology and Construction Management programme CONTENT 1 PROGRAMME STRUCTURE 5 2 CURRICULUM COMMON PART 7 2.1 Core areas in the study programme 7 2.1.1 General 7 2.1.2 Company

More information

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity

More information

Model Curriculum for K-12 Computer Science: Draft Report of the ACM K-12 Task Force Curriculum Committee*

Model Curriculum for K-12 Computer Science: Draft Report of the ACM K-12 Task Force Curriculum Committee* Model Curriculum for K-12 Computer Science: Draft Report of the ACM K-12 Task Force Curriculum Committee* Allen Tucker (Chair) - Bowdoin College Fadi Deek - New Jersey Inst. of Technology Jill Jones -

More information

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018 Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk

More information

Compu&ng Professions and Master s Degrees MSIS 2016

Compu&ng Professions and Master s Degrees MSIS 2016 Compu&ng Professions and Master s Degrees MSIS 2016 Bipin Prabhakar, Indiana University Mark F. Thouin, University of Texas at Dallas Heikki Topi, Bentley University Barbara H. Wixom, CISR, MIT Sloan School

More information

Large-scale Testbed and Cyber Range Organiza6on and Design

Large-scale Testbed and Cyber Range Organiza6on and Design CYBER RANGE ORGANIZATION AND DESIGN Large-scale Testbed and Cyber Range Organiza6on and Design Razvan Beuran, Ken-ichi Chinen Outline 1. Mo9va9on & overview 2. Making use of StarBED 3. Case studies 4.

More information

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Lynn Futcher and Johan Van Niekerk Nelson Mandela Metropolitan University, Port Elizabeth, South

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Teaching cybersecurity across the disciplines Debasis Bhattacharya debasisb@hawaii.edu maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Agenda Background Cybersecurity Education - Traditional

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Integrated Program Performance Management

Integrated Program Performance Management Integrated Program Performance Management The IPPM Certification The Integrated Program Performance Management Cer3fica3on is a senior expert-level professional creden3al offered by the College of Performance

More information

Systems Engineering Capabili2es

Systems Engineering Capabili2es Systems Engineering Capabili2es Purdue University November 9, 2010 Integrated Deepwater System Concept US Coast Guard / ICGS Recent History of SE at Purdue 2003 Purdue College of Engineering ini2ates Signature

More information

Evalua&ng Secure Programming Knowledge

Evalua&ng Secure Programming Knowledge Evalua&ng Secure Programming Knowledge Ma6 Bishop, UC Davis Jun Dai, Cal State Sacramento Melissa Dark, Purdue University Ida Ngambeki, Purdue University Phillip Nico, Cal Poly San Luis Obispo Minghua

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

NSA s Centers of Academic Excellence in Cyber Security

NSA s Centers of Academic Excellence in Cyber Security NSA s Centers of Academic Excellence in Cyber Security Centers of Academic Excellence in Cybersecurity NSA/DHS CAEs in Cyber Defense (CD) NSA CAEs in Cyber Operations (CO) Lynne Clark, Chief, NSA/DHS CAEs

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Assessing Medical Device. Cyber Risks in a Healthcare. Environment

Assessing Medical Device. Cyber Risks in a Healthcare. Environment Assessing Medical Device Medical Devices Security Cyber Risks in a Healthcare Phil Englert Director Technology Operations Environment Catholic Health Ini

More information

SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE

SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE TO: FROM: Members of the State Board of Education Karen B. Salmon, Ph.D. DATE: SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE PURPOSE: The purpose of this

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

Janice Sipior, Villanova Joe Valacich, Washington State. Panelists:

Janice Sipior, Villanova Joe Valacich, Washington State. Panelists: Heikki Topi Topi, Bentley Janice Sipior, Villanova Joe Valacich, Washington State Ryan T T. Wright Wright, Washington State Panelists: University University University University Introductions Status update

More information

Iden%ty, Risk and Privacy in the broader enterprise

Iden%ty, Risk and Privacy in the broader enterprise Iden%ty, Risk and Privacy in the broader enterprise Or Why the hell are you calling ME in Florida in the middle of the night because there is a tornado in Indiana?? Mark Bruhn Associate Vice President

More information

Raising Security and Trust in our Inter-Federated World

Raising Security and Trust in our Inter-Federated World Authen4ca4on and Authorisa4on for Research and Collabora4on Raising Security and Trust in our Inter-Federated World Hannah Short IT-DI-CSO CERN ISGC, Taipei 12-18 March, 2016 Agenda The federated landscape

More information

Threat modeling. Tuomas Aura T Informa1on security technology. Aalto University, autumn 2012

Threat modeling. Tuomas Aura T Informa1on security technology. Aalto University, autumn 2012 Threat modeling Tuomas Aura T- 110.4206 Informa1on security technology Aalto University, autumn 2012 Threats Threat = something bad that can happen Given an system or product Assets: what is there to protect?

More information

Integrating Software Assurance Knowledge into Conventional Curricula

Integrating Software Assurance Knowledge into Conventional Curricula Integrating Software Assurance Knowledge into Conventional Curricula Dan Shoemaker Jeff Ingalsbe Nancy Mead February 2011 ABSTRACT: One of our challenges is deciding how best to address software assurance

More information

A CBK for Information Security and Critical Infrastructure Protection

A CBK for Information Security and Critical Infrastructure Protection A CBK for Information Security and Critical Infrastructure Protection Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis Information Security and Critical Infrastructure Protection Research

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Comparing Security Curricula and Accreditations to Industry Needs

Comparing Security Curricula and Accreditations to Industry Needs Comparing Security Curricula and Accreditations to Industry Needs Who Are We: Robiam Background Professors at RIT Part of CSec Curriculum Committee Interests Web App Sec Education Rob Olson Chaim Sanders

More information

Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed

Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed April 29 th 2015 Leon Gommans: leon.gommans@klm.com Content - Introduc@on - Security Autonomous

More information

SeaCat: an SDN End- to- end Applica4on Containment ArchitecTure

SeaCat: an SDN End- to- end Applica4on Containment ArchitecTure : an SDN End- to- end Applica4on Containment ArchitecTure Enabling Secure Role Based Access To Sensi5ve Healthcare Data Junguk Cho, David Johnson, Makito Kano, Kobus Van der Merwe and Brent Elieson Mo4va4on

More information

Collateral Damage. Impact of Frequent Policy Changes on Vendors and Customers

Collateral Damage. Impact of Frequent Policy Changes on Vendors and Customers Collateral Damage Impact of Frequent Policy Changes on Vendors and Customers Joshua Brickman Director, Security Evalua:ons Oracle Global Product Security Glenn BruneFe Dis:nguished Security Architect Oracle

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11

New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11 New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11 SISA Informa2on Security Formal Risk Assessment Specialists Authors of

More information

Best Prac*ces in Accessibility and Universal Design for Learning. Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology

Best Prac*ces in Accessibility and Universal Design for Learning. Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology Best Prac*ces in Accessibility and Universal Design for Learning Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology Purpose The purpose of this session is to iden*fy best

More information

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 Goal of the Panel Engage the workshop par/cipants in an interac/ve discussion of the experimenta/on capabili/es and

More information

Blending Information Systems Security and Forensics Curricula

Blending Information Systems Security and Forensics Curricula Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,

More information

An introduc/on to Sir0i

An introduc/on to Sir0i Authen4ca4on and Authorisa4on for Research and Collabora4on An introduc/on to Sir0i Addressing Federated Security Incident Response Hannah Short CERN hannah.short@cern.ch TF-CSIRT May, 2016 Agenda Federated

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

April 17, Ronald Layne Manager, Data Quality and Data Governance

April 17, Ronald Layne Manager, Data Quality and Data Governance Ensuring the highest quality data is delivered throughout the university providing valuable information serving individual and organizational need April 17, 2015 Ronald Layne Manager, Data Quality and

More information

What makes a hot topic hot? An NSF Perspective

What makes a hot topic hot? An NSF Perspective What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance

More information

UTC Timekeeping in the Future

UTC Timekeeping in the Future UTC Timekeeping in the Future P. Kenneth Seidelmann University of Virginia John H. Seago Analytical Graphics, Inc. Time Scales Mean Solar Time Universal Time (UT1) Ephemeris Time Interna8onal Atomic Time

More information

Addressing the Challenges of the Networked Society through the Next Genera:on of IS Masters- Level Curricula MSIS 2016

Addressing the Challenges of the Networked Society through the Next Genera:on of IS Masters- Level Curricula MSIS 2016 Addressing the Challenges of the Networked Society through the Next Genera:on of IS Masters- Level Curricula MSIS 2016 - Andreas Gadatsch, Bonn- Rhein- Sieg University of Applied Sciences, Germany - Brian

More information

Presented by the Internet Security Alliance

Presented by the Internet Security Alliance Presented by the Internet Security Alliance Who s in Charge Howard Schmidt Problems and Solu9ons True and False Potpourri 100 100 100 100 100 202 202 202 202 202 303 303 303 303 303 406 406 406 406 406

More information

School of Engineering & Computational Sciences

School of Engineering & Computational Sciences Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING FOR INFORMATION PROCESSING PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING FOR INFORMATION PROCESSING PDF EBOOK EPUB MOBI DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING FOR INFORMATION PROCESSING PDF EBOOK EPUB MOBI Page 1 Page 2 computing curricula guidelines for associate degree

More information

DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING AND ENGINEERING TECHNOLOGY PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING AND ENGINEERING TECHNOLOGY PDF EBOOK EPUB MOBI DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING AND ENGINEERING TECHNOLOGY PDF EBOOK EPUB MOBI Page 1 Page 2 computing curricula guidelines for associate degree

More information

Suggestions for Addressing the Changing Needs of the Cyber Security Workforce Dr. Char Sample, & Dr. Connie Justice Introduction Cyber Security

Suggestions for Addressing the Changing Needs of the Cyber Security Workforce Dr. Char Sample, & Dr. Connie Justice Introduction Cyber Security Suggestions for Addressing the Changing Needs of the Cyber Security Workforce Dr. Char Sample, & Dr. Connie Justice Introduction Cyber Security programs continue to expand across universities creating

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing

More information

EMBEDDING CYBERSECURITY IN THE SECOND PROGRAMMING COURSE (CS2) *

EMBEDDING CYBERSECURITY IN THE SECOND PROGRAMMING COURSE (CS2) * EMBEDDING CYBERSECURITY IN THE SECOND PROGRAMMING COURSE (CS2) * Michael Verdicchio, Deepti Joshi, Shankar M. Banik Department of Mathematics and Computer Science The Citadel Charleston, SC 29409 843 953-5039

More information

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Faculty of Electronic Engineering Menoufya University MARCH 2015 1 st Edition Contents Introduction.....2

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

Tina Ladabouche. GenCyber Program Manager

Tina Ladabouche. GenCyber Program Manager Tina Ladabouche GenCyber Program Manager GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation

More information

Cybersecurity4All - Teaching cybersecurity across the disciplines

Cybersecurity4All - Teaching cybersecurity across the disciplines Cybersecurity4All - Teaching cybersecurity across the disciplines Debasis Bhattacharya debasisb@hawaii.edu maui.hawaii.edu/cybersecurity PCATT IT Symposium, 2017 Agenda Background Cybersecurity Education

More information

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1. Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Cybersecurity Essentials

Cybersecurity Essentials Cybersecurity Essentials University of Moratuwa Cisco Networking Center Cybersecurity Essentials Foundational Security Course Overview Cybersecurity Essentials covers foundational knowledge and essential

More information

Design Principles & Prac4ces

Design Principles & Prac4ces Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on

More information

Accelera'ng Our Path Forward. Stephen Gille8

Accelera'ng Our Path Forward. Stephen Gille8 Accelera'ng Our Path Forward Stephen Gille8 Two Independent Companies with Strong Market Posi'ons $6.7Billion Revenues 1 IM 38% Norton 31% SYMANTEC SECURITY ES 31% INFORMATION MANAGEMENT $4.2 billion Revenue

More information

NASPInet 2.0 The Evolu4on of Synchrophasor Networks

NASPInet 2.0 The Evolu4on of Synchrophasor Networks NASPInet 2.0 The Evolu4on of Synchrophasor Networks NASPI Working Group Mee4ng San Mateo, California March 24, 2015 Dick Willson and Dan LuKer Allied Partners LLC 1 Agenda Future Synchrophasor Networks

More information

VENDOR CONTRACTING : CYBERSECURITY CHECKLIST

VENDOR CONTRACTING : CYBERSECURITY CHECKLIST Software and Supply Chain Assurance Winter Forum 2017 VENDOR CONTRACTING : CYBERSECURITY CHECKLIST Lucy L. Thomson, Esq. CISSP American Bar Associa:on (ABA) Cybersecurity Legal Task Force Livingston PLLC,

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

Updating the contents and structure of Computer Engineering Larry Hughes Electrical and Computer Engineering Dalhousie University 18 November 2016

Updating the contents and structure of Computer Engineering Larry Hughes Electrical and Computer Engineering Dalhousie University 18 November 2016 Introduction Updating the contents and structure of Computer Engineering Larry Hughes Electrical and Computer Engineering Dalhousie University 8 November 06 The Department of Electrical and Computer Engineering

More information

Course Design Document. IS436: Data Security and Privacy. Version 1.0

Course Design Document. IS436: Data Security and Privacy. Version 1.0 Course Design Document IS436: Data Security and Privacy Version 1.0 7 July 2014 Table of Content 1 Versions History... 3 2 Overview of Data Security and Privacy Course... 3 2.1 Synopsis... 3 2.2 Prerequisites...

More information

Seneca. August 26,20II

Seneca. August 26,20II FROM THE OFFICE OF THE PRESIDENT llavid.&$n$w, tlr*sitiqnt Seneca Seneca College Df Applied Arts and Technology $ Ih{ *$ilii*ii Wr,l_! i\"liirt{hsilr. il \l 1..}[r *Y I f 411'l 4ll li{lif ri"llfri $j t,r,

More information

cctld in the Frontier of the IG Ecosystem Mo Dong China Internet Network Informa4on Center

cctld in the Frontier of the IG Ecosystem Mo Dong China Internet Network Informa4on Center cctld in the Frontier of the IG Ecosystem Mo Dong China Internet Network Informa4on Center cctld in IG Definition and Contents of Internet Governance The Definition of Internet Governance Internet governance

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

User Community Driven Development in Trust and Identity Services

User Community Driven Development in Trust and Identity Services User Community Driven Development in Trust and Identity Services Ann Harding, SWITCH Internet2 Global Summit 27 April 2015 Washington DCs Agenda Trust and Iden.ty Landscape GÉANT Research Community Engagement

More information

Networking: Modelling and Standardisa>on

Networking: Modelling and Standardisa>on Mestrado em Engenharia Informá>ca e de Computadores Master Degree (MSc) in Informa>on Systems and Computer Engineering Administração e Gestão de Infra-estruturas de IT IT Infrastructure Management and

More information

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Ben Scribner, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch

More information

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017 Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the

More information

Detec%ng Wildlife in Uncontrolled Outdoor Video using Convolu%onal Neural Networks

Detec%ng Wildlife in Uncontrolled Outdoor Video using Convolu%onal Neural Networks Detec%ng Wildlife in Uncontrolled Outdoor Video using Convolu%onal Neural Networks Connor Bowley *, Alicia Andes +, Susan Ellis-Felege +, Travis Desell * Department of Computer Science * Department of

More information

January 2011 Joint ISACA/IIA Mee5ng

January 2011 Joint ISACA/IIA Mee5ng January 2011 Joint ISACA/IIA Mee5ng Panel Discussion - Cloud Compu5ng January 13, 2011 Agenda Learning Objec5ves Introduc5ons Defini5ons Discussion Resource Links Note: Electronic copies of this presenta2on

More information

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons.

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons. Virtualization Yifu Rong Introduction Virtualiza5on provide an abstract environment to run applica5ons. Virtualiza5on technologies have a long trail in the history of computer science. Why we interested?

More information

REsources linkage for E-scIence - RENKEI -

REsources linkage for E-scIence - RENKEI - REsources linkage for E-scIence - - hlp://www.e- sciren.org/ REsources linkage for E- science () is a research and development project for new middleware technologies to enable e- science communi?es. ""

More information

FITC Institute Final Report Appendix K. Curriculum Analysis Report: Florida State University Computer Science Program

FITC Institute Final Report Appendix K. Curriculum Analysis Report: Florida State University Computer Science Program FITC Institute Final Report Appendix K Curriculum Analysis Report: June 9, 2015 Chandrahasa Ambavarapu, Graduate Research Assistant Jinxuan Ma, Ph.D., Post-Doctoral Researcher Heather Kelleher, Graduate

More information

Synergies of the Common Criteria with Other Standards

Synergies of the Common Criteria with Other Standards Synergies of the Common Criteria with Other Standards Mark Gauvreau EWA-Canada 26 September 2007 Presenter: Mark Gauvreau (mgauvreau@ewa-canada.com) Overview Purpose Acknowledgements Security Standards

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information