Cybersecurity and Computer Forensics Education

advertisement
Cybersecurity and Computer Forensics Education
Annual Report
Del Mar College
NSF Grant 0302734
(Original input was via NSF Fastlane, this is a copy of the field inputs)
Participant Individuals: CoPrincipal Investigator(s) : R. Brent Kesterson; Michael Harris;
Steven W Smith; Ira L WilskerCommunity college faculty(s) : Linda Ard; Ann Beheler; John
T FoustOther -- specify(s) : Miles Keller; Robert McFarland; Kenneth P Patterson; Robert
RamosTechnician, programmer(s) : Dee SalmonSenior personnel(s) : Lee SloanOther -specify(s) : Janet L WaltonUndergraduate student(s) : Denise Fanger
Type of Institution:2YR
Partner Organizations:Collin County Community College: In-kind Support; Personnel
Exchanges
Collin Community College, Preston Ridge Campus, is located in Frisco,
Texas. The Preston Ridge Campus is a member of a six school district
and is a grant partner institution with an approximate student body of
4,000 students, 9% Hispanic, 8% African-American, and 10%
Asian-American. DMC is partnered with this institution to share
training information regarding wi-fi security and convergence
technology.
Richland Community College: Collaborative Research; Personnel Exchanges
Richland Community College is located in Dallas, Texas, and is a
partner institution with an approximate 14,000 student body comprising
of 16% African-American, 14% Hispanic, and 14% Asian-American students
and is a member of the nine school Dallas County Community College
District. The College provides a co-pi for this project, R. Brent
Kesterson.
Lamar Institute of Technology: Collaborative Research; Personnel Exchanges
Lamar Institute of Technology is located in Beaumont, Texas and is a
partner institution with an approximate 6,300 student body comprising
27% African-American, 6% Hispanic, 2% Asian-American. The College
provides a co-primary investigator for this project, Ira Wilsker.
Coastal Bend Community College: Collaborative Research; Personnel Exchanges
Coastal Bend College, a partner institution in the Cybersecurity
project, has an enrollment of approximately 3,000 students, mostly
from underserved and 60% Hispanic. The College does not currently
offer a Cyber security program, it will participate in the
professional development activities of the project and will utilize
some of the developed curriculum modules and provide feedback.
Southwest Texas Community College: Collaborative Research; Personnel Exchanges
Southwest Texas Community College (SWTCC) is located in Uvalde, Texas,
and is a partner institution with approximately 4,000 students, mostly
underserved and 75% Hispanic.
SWTCC is one of Del Mar College's
Local Cisco Networking Academies and has partnered with Del Mar to
field test the security learning modules as they are completed.
Other collaborators:
Jolene Rogers, Iowa lakes Community College contacted project PI on
the scope of our forensics project. PI provided perspectives and other
organizations to contact, e.g. RCFLs, and state attorneys as well as
industry vendors to gain insights as to an avenue to pursue.
Dr. Donna Kaputa, Erie Community College-North, Williamville, NY,
contacted project PI to discuss grant proposal in Compute and Network
Security. PI provided perspectives on this tack and contributed to
their project in the area of proposal design and suggestions as well
as to organizations for insights.
Project Activities and Findings
Project Goal(s):
The DMC Cyber Security/Computer Forensics project consists of five goals that are
designed to advance technician training for this field:
a. Create the curriculum framework with server-based computer-based instruction
(CBI) interactive modules for the cyber-security courses that will support and standardize
the learning outcomes towards
industry recognized entry level and advanced technician certifications
in cyber security, such as Security+, GSEC (GIAC Security Essentials
Certifications), etc. These interactive multimedia training modules
will be able to support both traditional classroom and distance
learning delivery modes and provide a uniform methodology of training,
assessment, and documentation of learning objectives. Instructional
materials will incorporate existing exemplary training materials and
curricula developed from previous related grants.
b. Design and implement a tiered instructional delivery model,
replicable at other community college campuses to 1) leverage the use
of the developed CBI modules, 2) disseminate successful teaching
strategies, 3) promote an exportable model for teacher training at
both the community college level and upper level secondary public
schools, 4) to promote capacity building of instructors and programs.
c. Develop a model for articulated pathways for students from high school to the
community college and matriculating model from the
community college to a four-year institution.
d. Develop a Cyber Security AAS degree curriculum that can serve as a template
for a proposed applied associate degree.
e. Develop technician training certificates for workforce personnel and as an adjunct
to completing an Associate Degree in Networking Technology or Programming, etc.; e.g.
Security Associate Certificate I; Security Associate Certificate II; Security Associate
Certificate III.
Research and Education Activities:
I. Executive Summary:
A. The Cyber Security/Computer Forensics Project undertaken by Del
Mar College (DMC) is a three year grant funded project that will train
advanced technicians in the areas of cyber security, computer
forensics, data recovery and create curricula modules for
dissemination to community colleges. DMC, Corpus Christi, Texas is the
12th largest Hispanic serving community college in the nation,
enrolling over 25,000 students, 57% Hispanic, 60% female, and
predominately first generation college.
The past decade has seen an enormous increases in storage of
highly sensitive data on computer systems and distributed networks
that are vulnerable to unauthorized access. There has been a
corresponding rise in the sophistication and number of attempts to
breach system security. Presently a demand for technician training to
ensure the security of data for emergency services, government
operations and public/ private infrastructures, e.g.,transportation,
telecommunications, and energy exists. There has not been a
corresponding increase in cybersecurity/computer forensics technician
training at the associate degree level nor is there dissemination of
training modules for adaptation into community college curriculums.
DMC's project was developed to address this need to support capacity
building.
DMC's cybersecurity and computer forensics project encompasses
the development and dissemination of a comprehensive curriculum with
supporting computer based instructional modules to train technicians
at the associate degree level in cyber security to include network
security, computer forensics, data recovery, and related areas of
cyber crime, evidence collection, and technical and legal
investigative protocols. The associate degrees developed have been
organized around three core components: 1) academic, 2) information
technologies, and 3) new cybersecurity/information assurance courses
developed to address the following topics: networked servers; advanced
programming; ethics and law; network security and telecommunications;
encryption and viruses; computer forensics; investigative techniques
and rules of evidence; cryptography; encryption technologies; access
control systems, intrusion detection and response; security
architecture and auditing; information assurance; security management
practices; and disaster recovery planning.
B. Major achievements and progress related to the NSF project (not
including staff development or industry conferences) to date are
listed in a log format as follows:
July 03
The Texas community college security consortium (which
includes NSF partnered project institutions and investigators)
submitted ITSY course rubrics for approval to the THECB for inclusion
into the state's course inventory.
Sept 03
Texas Community Colleges received approval from THECB for use
of ITSY 'Information Technology Systems Security' courses
14 Oct 03 DMC CSIT Local Industry Advisory Board met, reviewed and
approved revision of CIS degrees to include two Associate Degree
Specializations in the security field. Reviewed nine (9) new
Information Technology Systems Security (ITSY) course titles and
descriptions to support the new degrees and made suggestions for
inclusion into department inventory.
31 Oct 03 Submitted the nine (9) new ITSY course rubrics with other
eighty additional course inventory changes for review and approval by
Del Mar College Curriculum Committee. Received approval for inclusion
in 2004-05 school catalog and institution's course inventory.
7 Nov 03 Submitted two specific security degree plan revisions under
the department's current Computer Information Systems degree;
Associate Degree in Computer Information Systems, Information Systems
Specialization, Computer Forensics Associate Emphasis, Associate
Degree in Computer Information Systems, Information Systems
Specialization, Information Systems Security Associate Emphasis, to
Del Mar College Curriculum Committee for review and approval.
Received formal approval from that committee to prepare for formal
submission to the Texas Higher Education Coordinating Board for
inclusion into the 2004-05 school catalog.
20 Nov 03 Visit by PI to UTSA-San Antonio, MIS Division and Northside
Independent School District, resulted in the replacement of a proposed
member of the National Visiting Committee and the addition of a NVC
nominee. Groundwork laid for the development of an articulation into
the UTSA-MIS-Information Assurance program was initiated.
17 Dec 03 Project investigators participated in UTSA's Center for
Information Assurance and Security's (CIAS) 'Operation Dark Screen'
computer security exercise preplanning session with municipal, county,
and military 'first responders'. The project's NVC chairman, Dr. Greg
White, was the exercise planner and leader.
21 Jan 04 Project PI met with Dan Talley, representative of WKMC
Architects, to discuss requirements for the specifications and
requirements for the possible inclusion of a dedicated forensics lab
in the 'Emerging Technologies' Building which is scheduled for
groundbreaking in summer '05.
4 Feb 04 Project investigators participated in UTSA-CIAS 'Operation
Dark Screen, Phase I', computer security exercise with area first
responders.
1 Mar 04 Submitted new degree plans to the Texas Higher Education
Coordinating Board for review and approval to be officially
implemented as a degree specialization under the Department's degree
program.
5 Mar 04 External Evaluator visit by Dr. Phil Linerode to collect data
and produce first external report.
Mar 04
Del Mar CSIT Department became a member of the National
Cybersecurity Consortium
Findings:
II. Project Findings.
The narrative of this project report will be described
relative to the first year activities found in the 'Project Activities
and Timetable' chart as submitted in the project proposal. First year
events and actions were designed to be formative, process centered,
initiative, and analytical with the end state to have identified job
skills, learning objectives and completed the necessary activities to
support course development. The majority of these objectives support
project goal (a), curriculum development.
Objective 1. Conduct task analysis:
Three of the project's primary investigators (Kesterson, Harris, Lee)with
representatives from other Texas community colleges (eight
total, three of which are partnered in this NSF project, e.g. Collin
County Community College, Richland College, Southwest Texas Community
College) participated in a consortium under the auspice of the Texas
Higher Education Coordinating Board (THECB) from September 2002
through August 2003 to develop curriculum materials to facilitate the
implementation of IT security programs in the state's community
colleges. The awarding of the NSF grant allowed Del Mar College (DMC)
to leverage the results/work from this consortium into a regional
program with eventual goal of developing web/server-based
instructional modules and strategies for national dissemination.
The state's Career Development Resources (CDR), a unit of the Texas Workforce
Commission, had identified security as an 'emerging
occupational area' thus preempting our requirement to determine need.
Consequently the group proceeded to conduct a comprehensive skills
analysis using the Performance Criteria Analysis (PCAL) method, a
hybrid DACUM and occupational analysis process, lead by Co-PI Brent
Kesterson. (See attached PCAL file). The PCAL process provided a more
time and cost effective option to obtain critical data for curriculum
development than the traditional DACUM process and has been used in
other NSF programs , e.g. MATEC,
The targeted occupation title was the 'computer security specialist'. Entry-level skills,
knowledge, and attributes (KSA) needed by this worker were then identified. A gap
analysis was initiated to
determine the difference between entry level (characteristics) of the
student target population and the skills level required of the
occupational field. This resulting data then provided a starting and
stopping point (scope) for the resulting curriculum design/framework.
The data also provided the contextual basis to meet nature of the job
as well as to provide the basis for describing the behavioral
characteristics of the ideal worker.
A review of existing curriculum for use by higher education for the target
occupation at the state and national level was then conducted. As documented in
numerous NSF and other white papers, a paucity of material outside of proprietary and
industry training institutes, e.g. Global Knowledge, Learning Tree International, SANS, etc.
(Note objectives 1, 3, and 4 are tied closely in the instructional design process). This
NSF project team carried forward the work accomplished previously from the THECB
consortium.
Objective 2: Attend technical/ vendor/certification seminars on
cybersecurity and computer forensics.
Activities related to this objective were easily documented as staff development is a
requirement for faculty promotion and staff retention at the project's primary institution.
Pertaining to security and forensics training topics, nine faculty and staff members from Del
Mar and one from our partnered institution, Lamar Technical Institute,
attended or have enrolled in thirty-six (36) separate training
seminars of which twenty (20) were three or more days in duration.
Significant is that no training costs were derived from the current
NSF grant (at the time of this writing) as those training
opportunities were supported by previous year funding from existing
state or institutional personal development grants applied for by the
individual member. Security and information assurance topics had been
previously targeted by the department as an 'emerging technology'
prior to knowledge of this award from its department's annual unit
review process and from the plethora of news articles in trade
publications. All five of the project's investigators attended at
least one industry conference with two individuals attending two.
Objective 3: Develop industry based learning objectives.
The PCAL process, described in Objective 1, provided KSA
characteristics of the ideal entry level IT security specialist and an
analysis as to the knowledge, skills, and attributes for a person to
be successful at the entry level. These characteristics were stated in
a behavioral statement and compiled in a spreadsheet. In other words,
the behavioral statement (performance criteria) listed in the
spreadsheet became a textual description of what a successful student
would be able to do as the result of completing a course of training
that addressed those behaviors. Industry representatives with subject
matter expertise in computer security and forensics were identified by
partnered schools and asked to analyzed each of those statements. Each
of these behavior statements or performance criteria were then rated
for characteristics, importance, proficiency, frequency and difficulty
using a scale of 1 to 4 (See Rating file). Subject matter experts
(SME) could add additional performance behavior statements if they
thought a critical skill had been omitted from the earlier process. In
short, the SME validated the statement listed on the premise of what a
computer security specialist should know and be able to do. The data
was then compiled. The committee members then analyzed the aggregated
listing by averaging all of behavioral ratings. All behavioral
objectives averages with a rating below 3.0 were then removed. The
rationale behind this criteria was that behaviors below this value
were identified as 'nice to know' skills but not essential for the
entry-level specialist. It was agreed by the members of the Texas
consortium, that retaining all skill sets would limit the number of
institutions using the developed materials as this would require more
staff expertise and logistical and equipment support. Setting the
rating level at 3.0 was determined to define the 'essential skills'
set.
The members of the consortium then performed an additional analysis, a crosswalk,
which grouped/aligned the skills into clusters which eventually formed the basis/link to
the development of a course title and description (See Crosswalk and ITSY Course File).
The KSAs were then converted to learning objectives meeting standard learning
Objectives criteria.
Objective 4: Validate learning objectives with industry partners
The activities of Objective 4 are linked closely with those of
objective 3 as the PCAL survey and ranking methodology used is
essentially a validation of the core behaviors for all of the derived
learning objectives by industry experts. Additionally, the principal
investigators along with DMC's faculty subject matter experts
validated these skill sets against the National Workforce Center for
Emerging Technologies (NWCET) Cybersecurity skill standards as
outlined in NWCET's Building A Foundation for Tommorow's appendices.
The principal investigators of this project will be presenting all of
the behavioral statements identified by the Texas consortium along
with additional learning objectives beyond the 'essential' to the DMC
local industry advisory board, which consists of representatives from
the area's petrochemical industries, the military, municipalities, law
enforcement, law offices, and project management firms at their spring
meeting in April '04. These learning objectives will also be
presented to the members of the National Visiting Committee. It was
felt that materials developed by this NSF grant would eventually be
made available to a broader cross section of institutions where the
larger and more resource endowed schools would be better able to
implement a more robust program where those skills described earlier
as 'nice to know' might be essential in a competitive employment
market which is sure to occur as this field matures over time.
Objective 5: Select and develop course materials
The actions required by this objective, supporting the project's
goals (a) and (b), will occur throughout the life of this project as
course development is an iterative process with constant revision and
updating of information, software, and supporting hardware as
procedures/protocols mature, technology evolves, and security threats
morph.
Objective 6. Submit degree plan to curriculum board:
An 'Information Systems' specialization under the Computer
Information System (CIS) Associate of Applied Science (AAS) degree was
formulated by departmental and project members under guidelines of the
THECB's Guidelines for Instructional Programs in Workforce Education
(GIPWE)in the summer of '03. Two tracks or emphasis were developed
under this specialization, a computer forensics emphasis and a pure
security technician emphasis were prepared. The proposals and
supporting course descriptions were submitted to the DMC Computer
Science and Information Technology (CSIT) industry advisory board for
review and action in their fall '03 meeting (copy of minutes
attached). The degree proposals were then presented on two separate
occasions to the DMC curriculum committee, an institutional internal
review board charged with evaluating program need and compliance with
state guidelines, in October and November of '03. Both tracks were
unanimously approved and recommend for submission to the next higher
echelon of approval in early spring '04. The actions targeting this
objective supports the attainment of the project goal(d).
Objective 7. Develop recruiting strategies and materials:
A multi-faceted approach has been taken to give the project the most cost effective
and wide dissemination but yet market the program to a specific technical population. The
project's approach has included the use of print media, direct contact/presentation and a
curriculum strategy to target/attract students from multiple entry points. Potential students
were identified to originate from (a) high school (b) other majors e.g. Music, English, etc.
(c) existing departmental student population (d) those already possessing either a
technical associate degree program or baccalaureate degree and (e) directly from the
workforce. Activities utilized thus far have included the following: (1) divisional newsletter
articles (2) community newspaper articles (3) recruitment at four school district career
day/fairs (4) revision of school catalog to include new program (5) development of
departmental curriculum flyers and program brochures which are in draft format undergoing
approval by the institution's college relations department (7) establishment of an ATE
project website with linkage to the existing departmental page which is undergoing approval
by the institution's web advisory committee (8) inviting high school networking classes for
an institutional visits (9) faculty presentations to school district counselors (10)
presentations and exhibit at a technology exposition (11) presentations at Tech-Prep
Consortium meetings(12) an exhibit at a national conference (13)
presentation at a chamber of commerce meeting.
The most effective strategy employed is where we target the
approximately 750 class members of the eighteen Local Cisco networking
academies that comprises the Del Mar College Regional Cisco Academy.
This is a prime 'self selected' population of technically oriented
students with knowledgeable instructors whom in the whole are more
effective than school guidance counselors for recruiting and have
greater rapport with them on a daily basis. Our Regional Cisco support
technicians contact these campuses and classes under contract for a
weekly technical support visit and are able to update both instructor
and students on departmental offerings and programs. A strong and
effective Tech-prep and dual credit program is in placed to facilitate
articulation of students into our program.
Another strategy employed utilizes the ITSY 1300 'Fundamentals of Computer
Security' class as an elective or course substitute in CS/IT degree curriculums, e.g.
networking, programming,
multimedia-development, etc. More significant is that this class
serves as an internal recruiting opportunity to market a second 'field
of study' to our existing majors.
Recruiting strategies under discussion for future incorporation
include: (1) having the department's multimedia classes develop a
promotional CD-Rom as a term project (2) the development and
sponsorship of an annual area high school networking/technology
competition among our Local Cisco academies in which recruitment and
security program awareness activities could be embedded with a theme
such as 'Defending the Alamo' (3) the development of a specific
internship with several of our municipal or governmental partners for
more public awareness (4) participation and exhibition in additional
secondary technical teacher education state conferences.
Objective 8. Begin enrolling students in new security courses:
Subsequent to receiving the grant in June '03, members of the project advised
approximately 75 students who requested information about the security curriculum. In
spring 2004, 54 students were enrolled in three security classes composing of two
sections of ITSY 1300 'Fundamentals of Information Security' and one section of ITSY
1342 'Information Technology Security'. Approximately 70% of these
students were from the population that had been previously advised.
The class student demographics consisted of 51 males and 3 females
with 37% Hispanic and 2% Asian students. Most students, 92%, have a
predominately networking curriculum background and the remaining were
programming majors. Four students had previously completed an
Associate degree in networking and one student possessed both a
Bachelor and Masters degree in English.
Objective 9. Submit Degree to Texas Higher Education Coordinating
Board and receive approval:
Degree proposals approved by the DMC curriculum committee outlined earlier in
Objective 6 were then prepared for electronic submission to the THECB on March 1, 2004
to begin the external review process. Feedback on this submission is expected from the
THECB in June/July '04.
Objective 10. Develop three cybersecurity certificates for post degree
and existing workforce.
Certificates are in draft formats and were presented to our industry advisory
committee in October '03. The committee tabled action on those certificates until spring
'04 on my recommendation. This action had no material impact on the approval of the
curriculum changes or the security degrees proposed as courses are developed and offered
would remain unaffected for academic year fall '04 thru summer '05.
This agenda item will be brought up again at the next advisory meeting
scheduled for this semester (spring '04) . A discussion will be held
in regards to whether a two or three certificate format is more
appropriate. The recommended format will then be prepared and
presented to the DMC curriculum committee in fall '04, to the Texas
Higher Education Coordinating Board in spring '05 with anticipated
inclusion in the fall '05 catalog. The intent and rationale for
certificates was to create optional exit points for students with
existing degrees or for those IT workforce individuals needing
additional education/training. The rationale for the delay was due to
the enormity of re-engineering our entire department's program.
Eighty-eight of eighty-nine courses had some change as to description,
funding code, learning objectives and scans competencies. The revision
of all ten existing associate of science and associate of applied
science degrees was also required. This objective addresses project
goal (e). This goal should be reported accomplished in the next
annual report.
III. Existing Program Impact
Security issues within information technology circles has taken
the forefront in discussions. Its a 'hot' topic and no doubt one of
the few reliable growth fields left in IT. It has been no different
among members of the project's host institution CSIT department.
Fully half of the full-time tenured faculty and 100% of its embedded
technical support staff personnel have participated in security
training seminars. In spring of '02, the CSIT five member core
curriculum committee initiated an extensive examination of the eight
existing AAS degrees (last extensively revised in fall '99) and
informally surveyed for the 'hot/buzz' topics of their industry
friends. It found that the topics of connectivity and database rose
to the top. With this in mind, the committee examined the existing
CSIT core subjects, consisting of 6 common courses found in each CSIT
degree. The committee found that networking/connectivity was
ubiquitous in every information technology endeavor and that database
technologies was being targeted by the state's CDR. With this in
mind, the core committee recommended to the department in the whole
the replacement of two courses in all AAS degree plans to reflect the
addition of a networking and database programming course. This
resulted in huge project to re-engineer all of the department's ten
degrees in spring and summer of '03. Proposals and presentations were
submitted to the department's four industry advisory board
subcommittees for review and suggestions. The subcommittees
eventually endorsed the revision proposal. The department's industry
advisory board approval provided the 'green light' to submit all
revised degree plans to DMC’s curriculum committee in fall '03 . With
the advent of the NSF award in summer '03, security issues received
additional emphasis in the introductory networking course, ITNW 1421.
Consequently all students are introduced to connectivity and security
issues early in their degree plans. The introductory database
requirement, ITSW 1407, identifies the database as the valuable
resource that is being protected/guarded. This strategy reflects that
security and information assurance is the routine 'way to conduct
business'. Security issues are now being brought into the introductory
programming classes. All of the department's course syllabi and
learning objectives are being revised to infuse 'safe computing' and
'reliable information' as inferred from the NWCET cybersecurity skill
sets and learning objectives.
A part of the recruitment and retention aspects of this project
will involve the awareness of the long term goals/plans of the
potential students beyond the AAS. Consequently three regional
universities have been contacted and visited concerning future
graduates and upward articulation which addresses one of the projects
fourth goal of articulation and matriculation. On 6 June '03, Dr.
Robert Diersing, Dean of Business at Texas A&M University-Kingsville,
TX, was contacted to inform him of the grant award but also to make
arrangements for a BAAS presentation by his staff to our potential
graduates (Dr. Julie Reyna presented to DMC counseling staff in Oct
'03). On 20 Nov '03, the project's PI visited the campus of UT-San
Antonio, TX, to meet with the CIAS director, Dr. Greg White but also
visited with the MIS Chairperson, Dr. Glenn Dietrich. Dr. Dietrich
expressed strong interest in articulating students into their BBA-MIS
Information Assurance program and the development of a technical
Bachelors degree, the BAAS. On 16 Feb 04, Peter Gawenda from
UT-Brownsville, TX, was contacted about its new Bachelor of Technology
degree for an articulation meeting. These upper division schools will
provide our project's future graduates multiple educational options.
IV. Significant carry-over of funds (> 20%).
The PI anticipates a significant carry-over of funds of approximately
48% from the first year proposed budget. This is due to the logistics
of establishing many of the processes, personnel assignments and
accounting infrastructures. The project in the first year is in a
startup mode and focused on process initiation. Although anticipatory
while awaiting the grant proposal's status, the enormity and scope of
shifting departmental perspective and reallocating resources to
support a concrete project upon award brought home the reality that
many critical events and milestones must now be accomplished and given
priority. Project's senior members at DMC were under direct
responsibility of the PI and were immediately reassigned duties, no
carryover of funds is anticipated in this category. Due to the
scheduling/timing of the award (June '03) and the process of
establishing sub-contracts and liaising with the Texas Engineering
Experiment Station, our grant fiscal agent, co-PIs Kesterson and
Wilsker began work on the project in the second quarter of the
project. Subcontract funds will have a 25% carryover from first year
allocations (approximately $5,800 remaining). The hiring of the
project's media specialist and student assistants was also delayed to
1st quarter 2nd year, due to the fact that course and curriculum
materials were in a research and formative stage and not yet in a form
to be converted to module format. Consequently, these people would
have been under utilized and the decision was made not to hire until
sufficient quantities material was generated. Identification of
relevant topics, lab activities and desired course material has been
identified and will be subcontracted for development to other faculty
and subject matter experts to rectify this situation. Consequently
90% of this funding (approximately $50,000 remaining) will be carried
forward. Design of brochures, curriculum promotional materials, etc.
was borne by the department's budget for the first year. Only 30% of
allocated funding was obligated (approximately $1,750 remaining).
Travel and related security training costs/ were offset by previously
acquired development and travel grants received previous to the grant
award year (approximately $8,000 remaining). None of the allocated
funding for software was obligated as the entry level courses offered
thus far, the PIs were able to use shareware, public domain tools, and
time-limited demoware ($12, 500 remaining). Software will be procured
as the advance security classes are being offered to obtain the latest
versions and extend their usefulness. None of the indirect funds
earned were obligated ($80,000).
In this same period, the host institution has supported the
project with nearly $45,000 in funding for equipment purchases. The
equipment acquired includes 16 rack mounted servers, 4 mobile rack
pods, 2 equipment racks, and 16 laptops.
V. Summary
The PI feels that as project momentum builds, deliverables
development increase, implementation and dissemination phases are
initiated, the need for funds expenditure will accelerate and that the
underobligation funding situation will be self correcting. I do not
foresee any major problems from a project perspective aside from
inherent time management needed for project partner networking,
personnel changes and the political sensitivities of working in a
collaborative multi-institutional environment. At this point, no
deviations from goals or deliverables are expected. Many opportunities
for collaboration have arisen from this NSF participation. The PIs of
the program look forward to the project's recent association with the
National Cybersecurity Consortium and the collaboration with
Miami-Dade and Virginia Community College System.
VI. Addenda
On January 30 Dr. Phillip Linerode, the project's external
evaluator was contacted and provided project materials and an verbal
overview of the Del Mar NSF project. Arrangements were made for the
project's first site visit and audit. On March 5, 2004, Dr. Linerode
conducted a site visit to review the project's progress, activity
artifacts and view materials under development. He also conducted
visits and interviews with project members and supervising personnel.
Dr. Linerode provided the PI with evaluation insights, documentation
suggestions, and course development documentation advice. His onsite
comments indicated that all stated 1st year objectives appear to have
been substantially met as the majority were formative in nature. He
plans to visit the project on a more periodic basis to more fully
engage in the process. An unsigned copy of his report is provided and
he will mail a signed copy to the NSF project officer.
A copy of the signed DMC industry advisory board dated 13 Oct '03
will be forwarded to project officer via e-mail as the file attachment
process of FASTLANE became problematic. The PCAL, Crosswalk, and
Rating Scale files referenced previously are similarly forwarded as
the conversion process skewed cells and alignments.
The National Visiting Committee has not met yet, although all
members have been contacted and/or personally visited. Its first
meeting is tentatively set for late May or early June due to the
number of educators on the roster. The PI is aware that this report
will remain incomplete until the NVC's findings are submitted.
Training and Development:
Project members and faculty are engaged in gaining additional subject
matter expertise to be incorporated into later course offerings.
Training and Development activities are listed as follows:
Gonzalez, G.
1.SANS Institute 'Securing Unix' (Currently enrolled)
2.Working Connections IT Conference 'Intermediate Network Security'
(Completed 10-15 Aug 03)
3.'Implementing Network Security', Microsoft Events (registered for
15Apr'04)
4.'Implementing Application and Data Security', Microsoft Events
(registered for 15Apr'04)
Hattox, D.
1.Cisco Fundamentals of Network Security (Completed Aug 04)
2.'Faculty Professional Development and Curriculum in Cybersecurity',
Miami-Dade/Virgina Community College System, National Cybersecurity
Consortium, (9-15May '04) registered class student designate
3.'Implementing Network Security', Microsoft Events (registered for
15Apr'04)
4.'Implementing Application and Data Security', Microsoft Events
(registered for 15Apr '04)
Harris, M.
1.Cisco Fundamentals of Network Security (currently enrolled)
2.SANS '10 Domains of the CISSP Security' (currently enrolled)
3.Working Connections IT Conference 'Network Security' (Completed Aug
'02)
4.Working Connections IT Conference 'Intermediate Network Security'
(Completed 10-15Aug 03)
5.'Implementing Network Security', Microsoft Events (registered for
15Apr'04)
6.'Implementing Application and Data Security', Microsoft Events
(registered for 15Apr'04)
Knox, W.
1. Working Connections IT Conference 'Introduction to Network
Security' (10-15 Aug'03)
2. 'Writing Secure Code - Best Practices', Microsoft Events
(registered for 15Apr'04)
3.'Essentials of Application Security', MSDN Security Briefing,
Microsoft Events (registered for 15Apr'04)
Leja, S.
1. 'Writing Secure Code - Best Practices', Microsoft Events
(registered for 15Apr'04)
2.'Essentials of Application Security', MSDN Security Briefing,
Microsoft Events (registered for 15Apr'04)
3.'Implementing Network Security', Microsoft Events (registered for
15Apr'04)'
4.Implementing Application and Data Security', Microsoft Events
(registered for 15Apr'04)
Lee, L.
1. Security+, LearnKey (currently enrolled)
2. CISSP 'Law, Investigation & Ethics' LearnKey (currently enrolled)
Patterson, K.
1. ICIAS Forensic computer Examiner Training Program (Certified
Electronic Evidence Collection Specialist designation) 28 April - May
9, '03, completed.
2. NW3C (National White Collar Crime Center) Advanced Data Recovery
and Analysis, Microsoft Windows NT/2000/XP 13-16 January '03,
completed.
Smith, S.
1. SANS 'Security Track 1', July 26-30, '03, completed.
2.'TCP/IP' Fall-03 Texas A&M University Corpus Christi, completed.
3. 'Operating Systems Software' Fall '03Texas A&M University -Corpus
Christi
4. 'Writing Secure Code - Best Practices', MSDN Security Briefing,
Microsoft Events (registered for 15Apr'04)
5. 'Essentials of Application Security', MSDN Security Briefing,
Microsoft Events (registered for 15Apr'04)
6. 'Faculty Professional Development and Curriculum in Cybersecurity'
Miami-Dade/Virgina Community College System, National Cybersecurity
Consortium,(9-15May'04), registered class student designate
Stewart, K.
1. Cisco Fundamentals of Network Security (currently enrolled)
2. SANS Institute '10 Domains of the CISSP Security' (Completed 1 Feb
04)
3. Working Connections IT Conference 'Intermediate Network Security'
(Completed 10-15 Aug'03)
4. 'Implementing Network Security', TechNet Security Briefing,
Microsoft Events (registered for 15Apr'04)
5. 'Implementing Application and Data Security', TechNet Security
Briefing, Microsoft Events (registered for 15Apr'04)
Wilsker, Ira
1. FBI Infragard, Cybersecurity Track, Houston TX (19-22 Oct '03)
Outreach Activities:
Although the project is in its first year the following
professional/industry outreach and participation activities have been
accomplished:
Harris, M.
1. CYBERSECURITY ISSUES: An ATE Roundtable Discussion AACC and NSF ATE
National PI conference (23Oct'03)
Kesterson, B.
1.'Cybersecurity Summit', National Cybersecurity Consortium, League of
Innovations, Milwaukee, WI. (18Oct '03)
Lee, L
1. 'Cybersecurity Summit', National Cybersecurity Consortium, League
of Innovations, Milwaukee, WI. (18Oct '03)
2. CYBERSECURITY ISSUES: An ATE Roundtable Discussion AACC and NSF ATE
National PI conference (23Oct'03)
Smith, S.
1. 'Cybersecurity Summit', National Cybersecurity Consortium, League
of Innovations, Milwaukee, WI. (18Oct '03)
2. CYBERSECURITY ISSUES: An ATE Roundtable Discussion AACC and NSF ATE
National PI conference (23Oct'03)
Wilsker, I.
1. Computer and Technology Expo, Houston TX, by Ira Wilsker (19-20Sep
'03)
Additional outreach activities are listed in a log format with a short
description.
9 Sept 03
Beaumont Civic Center, 'Computer Security Issues', by Ira
Wilsker to community leaders and citizens
15-16 Oct 03 Lamar University, guest lecture by Ira Wilsker on
information security.
18 Oct 03
League of Innovation, Chaired Cybersecurity Summit,
National Cybersecurity Consortium, League of Innovations, Milwaukee,
WI., chaired by Co-PI B. Kesterson
24 Oct 03
NSF ATE Conference, Washington DC, Project exhibit by PI
Lee and Co-PIs Harris and Smith
6 Nov 03
Lamar State College, 'Cybercrime and Information
Security', by Ira Wilsker, Beaumont, TX
25 Nov 03
Banquette High School 'Career Days', Banquette, TX by PI
L.Lee to approximately 55 students
18-19 Nov 03 Cyber security presentation by P. Patterson to three DMC
classes for E.Smith ITSC1301 classes, with approximately 45 students
9 Dec 03
King High School, CC. TX, Presentation to guidance
counselors by S. Smith, J. Delassen
17 Dec 03
Project investigators participated in UTSA's Center for
Information Assurance and Security's (CIAS) 'Operation Dark Screen'
computer security exercise preplanning session with municipal, county,
and military 'first responders'. The project's NVC chairman, Dr. Greg
White, was the exercise planner and leader
6 Jan 04
'The Secure Educational Network: Issues & Answers for the
Classroom Educator', 2004 Annual Educational Technology Expo & Library
Media Book Fair, Educational Service Center Region 2, by M. Harris, L.
Lee & S.W. Smith
4 Feb 04
Project investigators participated in UTSA-CIAS 'Operation
Dark Screen, Phase I', computer security exercise with Coastal Bend
Area first responders.
13 Feb 04
Tulso-Midway High School 'Career Days' by presented G.
Gonzalez to approximately 60 students
3 Mar 04
'Career And Technology Educators Day' West Oso ISD for
Vocational Counselors, teachers and students, K. Stewart presented to
several hundred students and teachers
2 Apr '04
'
South-Texas Career Expo' Kingsville Exposition Center,
(scheduled) D. Abarca, B. Dufrain, G. Gonzalez, S. Leja, B. Poplin,
S.W. Smith
Co-PI Ira Wilsker from partnered Lamar Institute of Technology has
written numerous computer security articles this past year for use by
many computer user groups throughout the country in their individual
newsletters or websites. A sample of some of the articles are listed
below.
1. 'Spam - Bane of the Internet', Ira Wilsker TBCS newsletter, CPUG
newsletter 8/03
2. 'Attack of the WORMS - Did We Learn Anything', Ira Wilsker, CPUG
newsleter 8/03
3. 'What We Should Have Learned By Now' by Ira Wilsker
4. 'Stay Alert with Security Alerts' by Ira Wilsker
5. 'Computer News and Updates' by Ira Wilsker
6. 'Computer News and Update' Part II, by Ira Wilsker
7. 'New and Interesting Technologies from COMDEX', by Ira Wilsker
8. 'Protecting Yourself from Identity Theft'by Ira Wilsker
9. 'Hi! 'I'm from the Government and I'm Here to Help Your Computer,
by Ira Wilsker, PCLifeline
10. 'Computer Viruses and Spam ruled in 2003' by Ira Wilsker
PCLifeline
11. 'Home Computer Security' by Ira Wilser, CSWF News and Views, Jan
04, APCUG Reports
12. 'Cyberfraud: Pfishing', by Ira Wilsker Bits & Bites, TBCS
Newsletter
News articles in appearing in print publications for the past year
include:
Spring 2003 Three New CIS Degrees' Information Superhighway
Newsletter, Division of Business and Career Programs
02 Jun 03 'NSF Funds Cybersecurity Project at Del Mar College' Texas
A&M Engineering News, Texas A&M College Station Newsletter
13 Jul 03 'Del Mar To Teach About Data Security', Corpus Christi
Caller Times
1 Sept 03 'Del Mar College Cybersecurity Program' Corpus Chamber of
Commerce Newsletter
Curricular target(s) of Project
Project Products, Publications, Materials
Journal Publications:
Book(s) of other one-time publications(s):
Other Specific Products:
Internet Dissemination
Additional Information
Special Requirements for Annual Project Report:
Unobligated Funds: $150000.00
Categories for which nothing is reported:Products: Journal PublicationsProducts: Book or other
one-time publicationProducts: Other Specific ProductProducts: Internet DisseminationContributions
Within DisciplineContributions to Other DisciplinesContributions to Education and Human
ResourcesContributions to Resources for Science and TechnologyContributions Beyond
Science and EngineeringSpecial Reporting RequirementsAnimal, Human Subjects, Biohazards
Contact Information for Project: Colloborating AwardsProject Activities and Findings: Innovations
or Unique Successes to DateProject Activities and Findings: Other Features of Project
Curricular target(s) of Project: Discipline(s) Affected by ProjectCurricular target(s) of Project:
Subject(s) Affected by ProjectCurricular target(s) of Project: Title(s) of Course(s) Affected by
ProjectCurricular target(s) of Project: Summary Description of Pedagogical Approaches
Project Products, Publications, Materials: Types of productsProject Products, Publications,
Materials: Other Types of Products
Internet Dissemination: FTP Server AddressInternet Dissemination: Gopher Server Address
Additional Information: Description of Equipment or InstrumentationAdditional Information:
Additional Sources of Funding
Download