Scholastic Sector: Information Section George Washington University Idaho State University Purdue University of California at Davis Naval Postgraduate School Gary Golubski Joshua Justice Andrew Jarrett Sorabh Gupta Dan Gifford Donna YooSlide 3
General Background Chief Technology Officer Guy Jones Former Director of Technology accountable for a task to supplant the IT foundation Full Disk Encryption of all GWU-claimed PCs with access to delicate information Banner, Oracle, DataMart, VPN Faculty, staff, and understudy specialists Both portable PCs and desktopsSlide 4
General Background Student Technology Services advances secure processing Has security guidance for understudies Requires understudies to utilize Cisco Clean Access before they can utilize ResNet on Windows Gives counsel about online protection (Myspace, Facebook, and so on.)Slide 5
General Background Information Security Services gives technical support and in addition security information Virus cautions Antivirus E-mail spam sifting Computer preparing IE 6 is still needed for individuals utilizing certain inner sitesSlide 6
Education (Undergraduate) B.S. in Computer Engineering and Computer Science B.S. in CS has a security choice, incorporating courses in Cryptography Computer security Network security Information approach B.A. in Computer ScienceSlide 7
Education (Graduate) Masterâs and Doctoral degrees accessible in Computer Science with a center in Computer Security and Information Assurance Courses in the accompanying: Cryptography Wireless/Mobile Security standards System security Repeatable class on ebb and flow research in the fieldSlide 8
Research Five employees focusing on Computer Security and Information AssuranceSlide 9
Research Lance J. Hoffman Professor of Computer Science Established the Computer Security project Leads a grant system for Computer Security and Information Assurance understudies Multiple productions about security Electronic voting, trust models, digital security activities, ensured working frameworks, protectionSlide 10
Research Rahul Simha Professor of Computer Science CVV: Citizen Verified Voting Publicly certain voting framework Open Source Prototyped in 2004 Uses the Chaum e-voting arrangement Encrypted paper receiptsSlide 11
Research Jonathan Stanton Assistant Professor of Computer Science Also chips away at CVV Focuses on scaling interchanges, including keeping up security Key assention in far reaching frameworks Authentication structures in customer server Moving past âpeer-to-peerâ correspondenceSlide 12
Research Poorvi Vora Assistant Professor of Computer Science Also takes a shot at CVV Analyzes protection utilizing amusement hypothesis CryptanalysisSlide 13
Research Sead Muftic Professor of Computer Science Author of different security course booksSlide 14
Outreach (Alliances and Partnerships) Partners with Dell and Apple to get a standard picture and pre-designed PCs and in addition lower costs Computers are not compulsory for GWU understudies Preconfigured PCs accompany Symantec Anti-VirusSlide 15
Outreach (Alliances and Partnerships) America Online Anthrotronix, Inc. Endocare Jones Day Nortel Networks UT-Batelle, LLC National Defense University Trident Systems National Science Foundation Department of Commerce Department of Defense Department of Health and Human Services U.S. Naval force Integrated Justice Information Systems Institute, Inc.Slide 16
Outreach (Alliances and Partnerships) Universities Alabama Agricultural And Mechanical University George Mason University Georgia Institute Of Technology University Of California/IrvineSlide 18
General Background 13,000 understudies selected Located in Pocatello, Idaho Over 280 projects Designated a National Center of Academic Excellence in Information Assurance Education by the National Security AgencySlide 19
Education (Undergraduate) B.S. Software engineering Minor in Computer Science No formal security track Can bring classes with in CS Computer Security & CryptographySlide 20
Education (Graduate) No formal Master\'s or PhD Security program M.S. in Electrical and Computer Science and Engineering Proposed March 2007 Still being worked on PhD in Engineering and Applied Science Research ranges incorporate Computer ScienceSlide 21
Research National Information Assurance Training & Education Center (NIATEC) Director: Dr. Corey Schou Students research in PC security Outreaches to government entry level positionsSlide 22
Research Cory Schou Director of NIATEC Works nearly w/senior administration at: Apple Microsoft United Airlines Research premiums incorporate data security & protectionSlide 23
Research Rich Lundeen Professor of Computer Science System Administrator Areas of premium incorporate Computer Security Teaches Computer Security & CryptographySlide 25
General Background Located in West Lafayette, Indiana Academic Analytics and The Chronicle of Higher Education\'s 2007 Top Research Universities Faculty Scholarly Productivity Index Information Security (CERIAS) #1 Information Technology/Information Systems (CERIAS) #2 Computational Science #5 Computer Systems and Software Engineering #17. Relationship for Computing Machinery Computer Science #9Slide 26
General Background Scholarship for Service Full educational cost and charges for a long time while the beneficiary seeks after a MS degree with specialization in security Covers stopping and pays a month to month stipend, in addition to a late spring temporary position consequently, the beneficiary is relied upon to gain agreeable ground towards the degree Upon graduation, the understudy will be obliged to accept an occupation with the Federal government for the same number of years as the understudy got the grantSlide 27
Education (Graduate) Degree programs MS Information Security (Interdisciplinary) (2000); PhD Information Security (Interdisciplinary) (2006) Department of Philosophy Department of Communication School of Technology Specialization Cyber Forensics (Graduate) (2007)Slide 28
Research Center for Education and Research in Information Assurance and Security (CERIAS) Research focus and not a scholastic division Does not offer degrees Programs permit a degree and to be connected with CERIAS Viewed as one of the worldâs driving habitats for exploration and instruction in regions of data security CERIAS is one of a kind among such national focuses in its multidisciplinary approachSlide 29
Research CERIAS incorporates personnel from six unique schools and 20+ offices crosswise over grounds Research center territories: Risk Management, Policies, and Laws Trusted Social and Human Interactions Security Awareness, Education, and Training Assurable Software and Architectures Enclave and Network Security Incident Detection, Response, and Investigation Identification, Authentication, and Privacy Cryptology and Rights ManagementSlide 30
Research Current Projects New Product Design Risk Assessment A High Assurance, High Capacity Platform for Information Operations Purdue University Regional Visualization and Analytics Center A Framework for Managing the Assured Information Sharing Lifecycle An Integrated and Utility-Centric Framework for Federated Text SearchSlide 31
Research Annual Security Symposium March 24-25 2009 2008 Virtually Secure or Securely Virtual? CERIAS; Configuresoft Wireless: Can You Secure Me Now? CS, Purdue; Motorola Malware and Trojans and Intrusionsâ¦Oh My! ECE, Purdue; McAfee; Lockheed Martin; Miter Finance & Healthcare: The Same; But Different RCHE, Purdue; CS, Purdue; HP LabsSlide 32
Research Cyber Forensics Lab Mission: instruction and preparing; connected and fundamental exploration; investigative backing. Reach out to law implementation, military, private area, and the educated community. Versatile Forensics World Conference, Chicago, May 26-30, 2009 FBI Cyber Crime Task ForceSlide 33
Research Charles PfleegerSlide 34
Outreach (Alliances and Partnerships) Configuresoft HP Labs Lockheed Martin McAfee Miter Motorola National Colloquium Information Systems Security Education (NCISSE) Software Engineering Research Center (SERC) National White Collar Crime Center (NW3C)Slide 35
University of California, DavisSlide 36
General Background Has around 30,000 understudies Located 15 miles west of Sacramento Ranked eleventh by "U.S. News and World Report" for state funded collegesSlide 37
Education (Undergraduate) No formal Computer Security degree program Computer Science is the nearest degree Able to take a few electives that identify with the field Undergraduate Computer Security Courses Computer Security Computer Security for Non-Majors Other related courses: Number Theory Computer NetworksSlide 38
Education (Graduate) No formal PhD degree in Computer Security However, one can represent considerable authority in Computer Security: Must be admitted to the Computer Science division Would have practical experience in security research Thesis would be about Computer Security Would get a PhD in Computer Science Graduate CS system has under 100 understudiesSlide 39
Education (Graduate) Graduate Computer Security Courses Modern Cryptography for E-Commerce Computer and Information Security Foundations of Computer and Information Security Computer Security: Intrusion Detection Based ApproachSlide 40
Research Ranks in the main 15 U.S. colleges in exploration subsidizing UCD Computer Security Laboratory Designated by NSA as a Center of Academic Excellence in Information Assurance Education in 1999Slide 41
Research Balancing Privacy and Analysis in Data Sanitization Vulnerabilities Analysis Secure Programming Clinic Forensic Logging and Auditing E-Voting ResearchSlide 42
Outreach (Alliances and Partnerships) Microsoft Research Intel Sprint Lab Oracle Pixar HP Labs Lawrence Livermore National Lab Sandia Motorola
Early American Police organizations: New York City police compel 1845 ... Cops dedicate extensiv ...
About Joshua Fireman. VP Market Development and senior expert. Previous lawyer and ... Joshua A. ...
Stamped by profoundly enthusiastic and energetic responses to wrongdoing ... Marx sees disciplin ...
They went similarly as the Jordan and stayed there before intersection. ... 3:15-16
Pada model ini sejumlah kecil server (dengan kapasitas besar) melayani customer host yang ... in ...
Taught, science based backwoods administration. Executive of Forestry (USDA) ... Walrus. US just ...
Youth Crime. Adolescent Arrest Rates per 100k Over Time. What Offenses are Committed By Juvenile ...
Joshua 24:1-15. . Joshua gathered every one of the tribes of Israel at Shechem and summoned Isra ...
Rahab Against the World Joshua 2. Rahab\'s confidence was courageous!Three strikes and you are o ...
What is equity : for the most part like fairness.Justice has been characterized as treatment as ...
Multimedia Systems. CSE 228F Amarnath Gupta firstname.lastname@example.org. Some Course Details. Course h ...
Matematica dell’amore. Uomo intelligente + Donna intelligente = Romanzo Uomo intelligente ...
DANTE E LA DONNA. DANTE: La vita Le opere La donna Beatrice Bibliografia. Come Dante v ...
Materi umum keselamatan dan kesehatan kerja untuk tenaga kerja asing. Data jumlah pembayaran ...
. Lemak dan minyak merupakan sumber energi yang efektif dibandingkan dengan karbohidrat dan prot ...
2. Transitional equity standards . UN (Louis Joinet) standards 1995Justice
Is equity for the group, equity by the group? . The short answer ought to be
Equity as a temperance. Michael Slote, Justice as a Virtue, Stanford Encyclopedia of Philosophy, ...
Possess the Area. Life Standards From the Book of Joshua. Joshua 1:1-18. After the demise of Mos ...