Gary Golubski Joshua Equity Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo.


76 views
Uploaded on:
Category: General / Misc
Description
Scholarly Part: Data Area George Washington College Idaho State College Purdue College of California at Davis Maritime Postgraduate School Gary Golubski Joshua Equity Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo General Foundation
Transcripts
Slide 1

Scholastic Sector: Information Section George Washington University Idaho State University Purdue University of California at Davis Naval Postgraduate School Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna Yoo

Slide 3

General Background Chief Technology Officer Guy Jones Former Director of Technology accountable for a task to supplant the IT foundation Full Disk Encryption of all GWU-claimed PCs with access to delicate information Banner, Oracle, DataMart, VPN Faculty, staff, and understudy specialists Both portable PCs and desktops

Slide 4

General Background Student Technology Services advances secure processing Has security guidance for understudies Requires understudies to utilize Cisco Clean Access before they can utilize ResNet on Windows Gives counsel about online protection (Myspace, Facebook, and so on.)

Slide 5

General Background Information Security Services gives technical support and in addition security information Virus cautions Antivirus E-mail spam sifting Computer preparing IE 6 is still needed for individuals utilizing certain inner sites

Slide 6

Education (Undergraduate) B.S. in Computer Engineering and Computer Science B.S. in CS has a security choice, incorporating courses in Cryptography Computer security Network security Information approach B.A. in Computer Science

Slide 7

Education (Graduate) Master’s and Doctoral degrees accessible in Computer Science with a center in Computer Security and Information Assurance Courses in the accompanying: Cryptography Wireless/Mobile Security standards System security Repeatable class on ebb and flow research in the field

Slide 8

Research Five employees focusing on Computer Security and Information Assurance

Slide 9

Research Lance J. Hoffman Professor of Computer Science Established the Computer Security project Leads a grant system for Computer Security and Information Assurance understudies Multiple productions about security Electronic voting, trust models, digital security activities, ensured working frameworks, protection

Slide 10

Research Rahul Simha Professor of Computer Science CVV: Citizen Verified Voting Publicly certain voting framework Open Source Prototyped in 2004 Uses the Chaum e-voting arrangement Encrypted paper receipts

Slide 11

Research Jonathan Stanton Assistant Professor of Computer Science Also chips away at CVV Focuses on scaling interchanges, including keeping up security Key assention in far reaching frameworks Authentication structures in customer server Moving past “peer-to-peer” correspondence

Slide 12

Research Poorvi Vora Assistant Professor of Computer Science Also takes a shot at CVV Analyzes protection utilizing amusement hypothesis Cryptanalysis

Slide 13

Research Sead Muftic Professor of Computer Science Author of different security course books

Slide 14

Outreach (Alliances and Partnerships) Partners with Dell and Apple to get a standard picture and pre-designed PCs and in addition lower costs Computers are not compulsory for GWU understudies Preconfigured PCs accompany Symantec Anti-Virus

Slide 15

Outreach (Alliances and Partnerships) America Online Anthrotronix, Inc. Endocare Jones Day Nortel Networks UT-Batelle, LLC National Defense University Trident Systems National Science Foundation Department of Commerce Department of Defense Department of Health and Human Services U.S. Naval force Integrated Justice Information Systems Institute, Inc.

Slide 16

Outreach (Alliances and Partnerships) Universities Alabama Agricultural And Mechanical University George Mason University Georgia Institute Of Technology University Of California/Irvine

Slide 18

General Background 13,000 understudies selected Located in Pocatello, Idaho Over 280 projects Designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency

Slide 19

Education (Undergraduate) B.S. Software engineering Minor in Computer Science No formal security track Can bring classes with in CS Computer Security & Cryptography

Slide 20

Education (Graduate) No formal Master\'s or PhD Security program M.S. in Electrical and Computer Science and Engineering Proposed March 2007 Still being worked on PhD in Engineering and Applied Science Research ranges incorporate Computer Science

Slide 21

Research National Information Assurance Training & Education Center (NIATEC) Director: Dr. Corey Schou Students research in PC security Outreaches to government entry level positions

Slide 22

Research Cory Schou Director of NIATEC Works nearly w/senior administration at: Apple Microsoft United Airlines Research premiums incorporate data security & protection

Slide 23

Research Rich Lundeen Professor of Computer Science System Administrator Areas of premium incorporate Computer Security Teaches Computer Security & Cryptography

Slide 25

General Background Located in West Lafayette, Indiana Academic Analytics and The Chronicle of Higher Education\'s 2007 Top Research Universities Faculty Scholarly Productivity Index Information Security (CERIAS) #1 Information Technology/Information Systems (CERIAS) #2 Computational Science #5 Computer Systems and Software Engineering #17. Relationship for Computing Machinery Computer Science #9

Slide 26

General Background Scholarship for Service Full educational cost and charges for a long time while the beneficiary seeks after a MS degree with specialization in security Covers stopping and pays a month to month stipend, in addition to a late spring temporary position consequently, the beneficiary is relied upon to gain agreeable ground towards the degree Upon graduation, the understudy will be obliged to accept an occupation with the Federal government for the same number of years as the understudy got the grant

Slide 27

Education (Graduate) Degree programs MS Information Security (Interdisciplinary) (2000); PhD Information Security (Interdisciplinary) (2006) Department of Philosophy Department of Communication School of Technology Specialization Cyber Forensics (Graduate) (2007)

Slide 28

Research Center for Education and Research in Information Assurance and Security (CERIAS) Research focus and not a scholastic division Does not offer degrees Programs permit a degree and to be connected with CERIAS Viewed as one of the world’s driving habitats for exploration and instruction in regions of data security CERIAS is one of a kind among such national focuses in its multidisciplinary approach

Slide 29

Research CERIAS incorporates personnel from six unique schools and 20+ offices crosswise over grounds Research center territories: Risk Management, Policies, and Laws Trusted Social and Human Interactions Security Awareness, Education, and Training Assurable Software and Architectures Enclave and Network Security Incident Detection, Response, and Investigation Identification, Authentication, and Privacy Cryptology and Rights Management

Slide 30

Research Current Projects New Product Design Risk Assessment A High Assurance, High Capacity Platform for Information Operations Purdue University Regional Visualization and Analytics Center A Framework for Managing the Assured Information Sharing Lifecycle An Integrated and Utility-Centric Framework for Federated Text Search

Slide 31

Research Annual Security Symposium March 24-25 2009 2008 Virtually Secure or Securely Virtual? CERIAS; Configuresoft Wireless: Can You Secure Me Now? CS, Purdue; Motorola Malware and Trojans and Intrusions…Oh My! ECE, Purdue; McAfee; Lockheed Martin; Miter Finance & Healthcare: The Same; But Different RCHE, Purdue; CS, Purdue; HP Labs

Slide 32

Research Cyber Forensics Lab Mission: instruction and preparing; connected and fundamental exploration; investigative backing. Reach out to law implementation, military, private area, and the educated community. Versatile Forensics World Conference, Chicago, May 26-30, 2009 FBI Cyber Crime Task Force

Slide 33

Research Charles Pfleeger

Slide 34

Outreach (Alliances and Partnerships) Configuresoft HP Labs Lockheed Martin McAfee Miter Motorola National Colloquium Information Systems Security Education (NCISSE) Software Engineering Research Center (SERC) National White Collar Crime Center (NW3C)

Slide 35

University of California, Davis

Slide 36

General Background Has around 30,000 understudies Located 15 miles west of Sacramento Ranked eleventh by "U.S. News and World Report" for state funded colleges

Slide 37

Education (Undergraduate) No formal Computer Security degree program Computer Science is the nearest degree Able to take a few electives that identify with the field Undergraduate Computer Security Courses Computer Security Computer Security for Non-Majors Other related courses: Number Theory Computer Networks

Slide 38

Education (Graduate) No formal PhD degree in Computer Security However, one can represent considerable authority in Computer Security: Must be admitted to the Computer Science division Would have practical experience in security research Thesis would be about Computer Security Would get a PhD in Computer Science Graduate CS system has under 100 understudies

Slide 39

Education (Graduate) Graduate Computer Security Courses Modern Cryptography for E-Commerce Computer and Information Security Foundations of Computer and Information Security Computer Security: Intrusion Detection Based Approach

Slide 40

Research Ranks in the main 15 U.S. colleges in exploration subsidizing UCD Computer Security Laboratory Designated by NSA as a Center of Academic Excellence in Information Assurance Education in 1999

Slide 41

Research Balancing Privacy and Analysis in Data Sanitization Vulnerabilities Analysis Secure Programming Clinic Forensic Logging and Auditing E-Voting Research

Slide 42

Outreach (Alliances and Partnerships) Microsoft Research Intel Sprint Lab Oracle Pixar HP Labs Lawrence Livermore National Lab Sandia Motorola

Recommended
View more...