Computer Science and Engineering 1 Future of Cyber Security.

16
Computer Science and Engineering 1 Future of Cyber Security

Transcript of Computer Science and Engineering 1 Future of Cyber Security.

Page 1: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 1

Future of Cyber Security

Page 2: Computer Science and Engineering 1 Future of Cyber Security.

Top Security Threats Top Security Threats 20132013

• Threat #1: Social Engineering• Threat #2: Advanced Persistent Threats (APTs)• Threat #3: Internal Threats• Threat #4: Bring-your-own-device (BYOD) • Threat #5: Cloud Security

Source: Forbes Magazine, http://www.forbes.com/sites/ciocentral/2012/12/05/the-biggest-cybersecurity-threats-of-2013-2/

Computer Science and Engineering 2

Page 3: Computer Science and Engineering 1 Future of Cyber Security.

What can we do?What can we do?

Computer Science and Engineering 3

Page 4: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 4

Information Assurance ResearchEducation

Page 5: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 5

IA ResearchIA Research

Wenyuan Xu (since 2007)Wenyuan Xu (since 2007)http://www.cse.sc.edu/~wyxuWireless networking and security, sensor networks, network security and privacy, jamming detection and avoidance

Chin-Tser Huang (since 2003)Chin-Tser Huang (since 2003)http://www.cse.sc.edu/~huangctIntrusion detection, wireless security, distributed systemsnetwork security, network protocol design and verification

Csilla Farkas (since 2000)Csilla Farkas (since 2000)http://www.cse.sc.edu/~farkasWeb data and application (WS & SOA) security, Access Control Policies, SCADA software reliability, economic and social impact of cyber attacks

Application layer

Transport layer

Internet layer

Network Interface

Page 6: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 6

• Information Assurance SpecializationInformation Assurance Specialization• Meeting National IA Training Standards Meeting National IA Training Standards

• CNSS 4011, Information Systems Security Professionals

• CNSS 4013, System Administrators

• CNSS 4014, Information Systems Security Officers

• National Center of Academic Excellence in National Center of Academic Excellence in Information Assurance EducationInformation Assurance Education

IA EducationIA Education

Page 7: Computer Science and Engineering 1 Future of Cyber Security.

IA SpecializationIA Specialization

• Undergraduate and graduate students of CSE Dept.

• Receive National Training Standard for Information Systems Security (INFOSEC) Professionals, CNSS 4011

• Degree Requirements: 9 Hours of course work with B or better grade

– Required: CSCE 522: Information Security Principles (3 credits)

– 2 elective courses (6 credits)

• http://www.cse.sc.edu/undergraduate/iaspecialization

Computer Science and Engineering 7

Page 8: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 8

IA CoursesIA Courses

• CSCE 201 – Introduction to Security• CSCE 517 – Computer Crime and Forensics • CSCE 522 – Information Security Principles• CSCE 557 – Introduction to Cryptography• CSCE 548 – Secure Software Construction

• Projects in other courses, e.g., CSCE 520, 416, etc.• Magellan Scholar

Page 9: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 9

Global Demand for IA Global Demand for IA Workforce Workforce

• Worldwide:– 2010: 2.28 million – 2015: 4.24 million (projected)– Compound Annual Growth Rate: 13.2%

• Americas:– 2010: 920,845– 2015: 1,785,236– Compound Annual Growth Rate: 14.2%

Information Warfare - Farkas

9

Page 10: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 10

SalarySalary

• 2011 Annual salary(ISC)2® Member/non-member• Worldwide: $98,600/$78,500• Americas: $106,900/$92,900

10

Page 11: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 11

IA JobsIA Jobs

• Job market– Civil (Join Information Systems Security Association, ISSA,

https://www.issa.org/ )

– Government (Internship available at USC-UTS, and SC Dept. of Probation, Parole, and Pardon Services)

– Military (Internship available at SPAWAR, Charleston)

• Education and training requirements (B.S. degree, certification, hands-on experiments)

• Salary• FUN

Page 12: Computer Science and Engineering 1 Future of Cyber Security.

Current IA NewsCurrent IA News

• Is the FBI Any Match for Cyber Criminals? , http://www.dfinews.com/news/2013/11/fbi-any-match-cyber-criminals?et_cid=3611017&et_rid=454822392&location=top#.Uo0bQydkHj4 – After 9/11: FBI shifted from organized crime to

fighting terrorism– Current: counter cyber attacks

Computer Science and Engineering 12

Page 13: Computer Science and Engineering 1 Future of Cyber Security.

• US Ponders Ways Not to Destroy Bitcoin , http://www.dfinews.com/news/2013/11/us-ponders-ways-not-destroy-bitcoin?et_cid=3611017&et_rid=454822392&location=top#.Uo0cjSdkHj4 – Illegal use of bitcoin should it be destroyed?– Over-regulation bitcoin moves out of US control

Computer Science and Engineering 13

Current IA NewsCurrent IA News

Page 14: Computer Science and Engineering 1 Future of Cyber Security.

• NSA Vowed to Fix Its Collection Errors, http://www.dfinews.com/news/2013/11/nsa-vowed-fix-its-collection-errors#.Uo0dNSdkHj4 – Admitted surveillance rule violations due to poor

management, lack of oversight, typographical errors– Promise of safety measures

Computer Science and Engineering 14

Current IA NewsCurrent IA News

Page 15: Computer Science and Engineering 1 Future of Cyber Security.

More NewsMore News

• Miners Face Rising Threat of Cyber Attacks due to increased automation

• Cyber Deviance and Cyber Crime Start and Peak in Teen Years start around 15 and peak around 18

• Five More Suspects Arrested in $45 Million Global Bank Heist – loss 45 million from ATM

• Chicago hacker sentenced to 10 years, “hacktivist" Jeremy Hammond explained that his cybercrimes were altruistic acts of civil disobedience

Computer Science and Engineering 15

Page 16: Computer Science and Engineering 1 Future of Cyber Security.

Computer Science and Engineering 16

Thank you!Thank you!