Using Value Engineering to Propel Cyber-Physical Systems ...
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for...
Transcript of Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for...
![Page 1: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/1.jpg)
Computer Science and Engineering 1
Cyber SecurityCyber SecurityUniversity of South CarolinaUniversity of South Carolina
ColumbiaColumbia
Center for Information Assurance Engineering (CIAE)http://www.cse.sc.edu/isl
![Page 2: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/2.jpg)
Who is Impacted by Cyber Who is Impacted by Cyber Attacks? Attacks?
Source: http://www.cagle.com/2010/05/internet-privacy/
![Page 3: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/3.jpg)
Computer Science and Engineering 3
Ashley Madison adultery site hack: will I be found out?TheGuardian, http://www.theguardian.com/world/2015/jul/21/ashley-madison-adultery-site-hack-will-i-be-found-out-what-you-need-to-know
![Page 4: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/4.jpg)
What can we do?What can we do?
Computer Science and Engineering 4
![Page 5: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/5.jpg)
Computer Science and Engineering 5
Information Assurance ProgramAt
USC
![Page 6: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/6.jpg)
Computer Science and Engineering 6
Center for Information Assurance Center for Information Assurance EngineeringEngineering
MissionMissionPROMOTE INFORMATION SECURITY
AWARENESS OFFER HIGH QUALITY EDUCATION AND
RESEARCH FOSTER COLLABORATION BETWEEN
ACADEMIA, INDUSTRY AND GOVERNMENT
![Page 7: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/7.jpg)
Computer Science and Engineering 7
• IA&S Graduate Certificate ProgramIA&S Graduate Certificate Program• NEW: Cyber Security Studies CS2 NEW: Cyber Security Studies CS2 • Approved for 2016 Fall Approved for 2016 Fall
• Meeting National IA Training Standards Meeting National IA Training Standards • National Center of Academic Excellence in National Center of Academic Excellence in
Information Assurance Education and ResearchInformation Assurance Education and Research
IA EducationIA Education
![Page 8: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/8.jpg)
What is Cyber Security? What is Cyber Security?
Highly Technical
• People, processes, and technology
• Legislation and Regulation
• Risk management
![Page 9: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/9.jpg)
Understanding Cyber Security Understanding Cyber Security RiskRisk
dreamsmademe.wordpress.com
Cyber Security Threats
•Mobile Malware•Virtual currencies•Stealth attacks by state actors•Social attack•New PC and server attacks•Cloud-based attacks
Source: McAfee Labs 2014 Treats Predictions
![Page 10: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/10.jpg)
• Business Policy Decision • Communication between technical and
administrative employees• Internal vs. external resources• Legal and regulatory requirements
• Developing security capabilities
Risk AssessmentRisk Assessment
Cost
Security level 0 % 100%
Optimal level of security at a minimum cost
Security Investment Cost of Breaches
![Page 11: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/11.jpg)
Workforce Workforce
• Education• Certification• Government initiatives
![Page 12: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/12.jpg)
National Center of Academic National Center of Academic Excellence in Excellence in
Information Assurance EducationInformation Assurance Education
![Page 13: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/13.jpg)
Computer Science and Engineering 13
Courses and FacultyCourses and FacultyCourses• CSCE 201 – Introduction to Security• CSCE 517 – Computer Crime and Forensics • CSCE 522 – Information Security Principles• CSCE 557 – Introduction to Cryptography• CSCE 548 – Secure Software Construction• CSCE 590 – Penetration TestingFaculty
Caroline Eastman Csilla Farkas Chin-Tser Huang Ronni Wilkinson Wenyuan Xu
![Page 14: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/14.jpg)
Undergraduate-Level IA Undergraduate-Level IA SpecializationSpecialization
• Majors: CS, CE, CIS + any other USC major – need necessary prerequisites for CSCE 522
• Courses to take:– CSCE 522 – Information Security Principles– 1 additional IA course – 1 additional course with IA component
Computer Science and Engineering 14
![Page 15: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/15.jpg)
Computer Science and Engineering 15
Graduate-Level IA Graduate-Level IA SpecializationSpecialization
•Majors: CS, CE, CIS, MS, ME, PhD•Courses to take:
– CSCE 522 – Information Security Principles
– 2 additional IA courses or MS Thesis in IA
![Page 16: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/16.jpg)
Computer Science and Engineering 16
IA&S Certificate Graduate IA&S Certificate Graduate ProgramProgram
Admission Requirements
• Baccalaureate degree in computer science, computer engineering, or a related field
• Admission requirements for graduate study at the Department of Computer Science and Engineering http://www.cse.sc.edu/graduate/ias
Meets Industry Certification
• Security +
• CISSP
![Page 17: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/17.jpg)
Proposed Cyber Security Proposed Cyber Security Studies Graduate CertificateStudies Graduate Certificate
• Core Courses:
– CSCE 522 – Information Systems Security Principles (3 credit hours)
– CSCE 715– Network Security (3 credit hours)
• Elective Courses (6 credits of the following)
– CSCE 517 – Computer Crime and Forensics (3 credit hours)
– CSCE 557 – Introduction to Cryptography (3 credit hours)
– CSCE 548 – Secure Software Construction (3 credit hours)
– CSCE 727 – Information Warfare (3 credit hours)
– CSCE 813 – Internet Security (3 credit hours)
– CSCE 814 - Distributed Systems Security (3 credits)
– CSCE 824 – Secure Databases (3 credit hours)
– CSCE 798 – Directed Study and Research (max. 3 credit hours)
Computer Science and Engineering 17
![Page 18: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/18.jpg)
Computer Science and Engineering 18
Global IA Global IA Workforce Trends Workforce Trends
• A Frost & Sullivan Market Survey Sponsored by International Information Systems Security Certification Consortium (ISC)2®
• Prepared by Robert Ayoub, CISSP, Global Program Director, Information Security
• Electronic survey, conducted through a Web-based portal
18
![Page 19: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/19.jpg)
Computer Science and Engineering 19
Demand for IA Demand for IA Workforce Workforce
• Worldwide:– 2010: 2.28 million – 2015: 4.24 million (projected)– Compound Annual Growth Rate:
13.2%• Americas:
– 2010: 920,845– 2015: 1,785,236– Compound Annual Growth Rate:
14.2% Information Warfare - Farkas
19
![Page 20: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/20.jpg)
Computer Science and Engineering 20
SalarySalary
• 2011 Annual salary(ISC)2®
Member/non-member• Worldwide: $98,600/$78,500• Americas: $106,900/$92,900
20
![Page 21: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/21.jpg)
Computer Science and Engineering 21
IA JobsIA Jobs
• Job market– Civil (Join Information Systems Security Association, ISSA,
https://www.issa.org/ )
– Government (Internship available at USC-UTS, and SC Dept. of Probation, Parole, and Pardon Services)
– Military (Internship available at SPAWAR, Charleston)
• Education and training requirements (B.S. degree, certification, hands-on experiments)
• Salary• FUN
![Page 22: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/22.jpg)
Computer Science and Engineering 22
IA ResearchIA Research
Wenyuan Xu (since 2007)Wenyuan Xu (since 2007)http://www.cse.sc.edu/~wyxuWireless networking and security, sensor networks, network security and privacy, jamming detection and avoidance
Chin-Tser Huang (since 2003)Chin-Tser Huang (since 2003)http://www.cse.sc.edu/~huangctIntrusion detection, wireless security, distributed systemsnetwork security, network protocol design and verification
Csilla Farkas (since 2000)Csilla Farkas (since 2000)http://www.cse.sc.edu/~farkasWeb data and application (WS & SOA) security, Access Control Policies, SCADA software reliability, economic and social impact of cyber attacks
Application layer
Transport layer
Internet layer
Network Interface
![Page 23: Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE) .](https://reader035.fdocuments.net/reader035/viewer/2022070409/56649e885503460f94b8bf19/html5/thumbnails/23.jpg)
Computer Science and Engineering 23
Contact Information
Center for Information Assurance Engineering
Department of Computer Science and Engineering
http://www.cse.sc.edu/