Department of Computer Science and Engineering and the South

advertisement
Cyber Security
University of South Carolina
Columbia
Center for Information Assurance Engineering (CIAE)
http://www.cse.sc.edu/isl
Computer Science and Engineering
1
Who is Impacted by Cyber
Attacks?
Source: http://www.cagle.com/2010/05/internet-privacy/
Ashley Madison adultery site hack: will I be found out?
TheGuardian,
http://www.theguardian.com/world/2015/jul/21/ashley-madison-adultery-site-hack-will-i-be-found-out-what-you-need-to-know
Computer Science and Engineering
3
What can we do?
Computer Science and Engineering
4
Information Assurance Program
At
USC
Computer Science and Engineering
5
Center for Information Assurance
Engineering
Mission
PROMOTE INFORMATION SECURITY AWARENESS
OFFER HIGH QUALITY EDUCATION AND RESEARCH
FOSTER COLLABORATION BETWEEN ACADEMIA,
INDUSTRY AND GOVERNMENT
Computer Science and Engineering
6
IA Education
• IA&S Graduate Certificate Program
• NEW: Cyber Security Studies CS2
• Approved for 2016 Fall
• Meeting National IA Training Standards
• National Center of Academic Excellence in
Information Assurance Education and Research
Computer Science and Engineering
7
What is Cyber Security?
Highly Technical
•
•
•
People, processes, and technology
Legislation and Regulation
Risk management
Understanding Cyber Security
Risk
Cyber Security Threats
• Mobile Malware
• Virtual currencies
• Stealth attacks by state
actors
• Social attack
• New PC and server attacks
• Cloud-based attacks
Source: McAfee Labs
2014 Treats Predictions
dreamsmademe.wordpress.com
Risk Assessment
• Business Policy Decision
• Communication between technical and
administrative employees
• Internal vs. external resources
• Legal and regulatory requirements
• Developing security capabilities
Optimal level of security
at a minimum cost
Cost
Security Investment
0%
Cost of Breaches
Security level
100%
Workforce
• Education
• Certification
• Government initiatives
National Center of Academic
Excellence in
Information Assurance Education
Courses and Faculty
Courses
• CSCE 201 – Introduction to Security
• CSCE 517 – Computer Crime and Forensics
• CSCE 522 – Information Security Principles
• CSCE 557 – Introduction to Cryptography
• CSCE 548 – Secure Software Construction
• CSCE 590 – Penetration Testing
Faculty
 Caroline Eastman
 Csilla Farkas
 Chin-Tser Huang
 Ronni Wilkinson
 Wenyuan Xu
Computer Science and Engineering
13
Undergraduate-Level IA
Specialization
• Majors: CS, CE, CIS + any other USC major
– need necessary prerequisites for CSCE 522
• Courses to take:
– CSCE 522 – Information Security Principles
– 1 additional IA course
– 1 additional course with IA component
Computer Science and Engineering
14
Graduate-Level IA
Specialization
• Majors: CS, CE, CIS, MS, ME, PhD
• Courses to take:
– CSCE 522 – Information Security Principles
– 2 additional IA courses or MS Thesis in IA
Computer Science and Engineering
15
IA&S Certificate Graduate
Program
Admission Requirements
• Baccalaureate degree in computer science, computer
engineering, or a related field
• Admission requirements for graduate study at the Department
of Computer Science and Engineering
http://www.cse.sc.edu/graduate/ias
Meets Industry Certification
• Security +
• CISSP
Computer Science and Engineering
16
Proposed Cyber Security
Studies Graduate Certificate
• Core Courses:
– CSCE 522 – Information Systems Security Principles (3 credit hours)
– CSCE 715– Network Security (3 credit hours)
• Elective Courses (6 credits of the following)
– CSCE 517 – Computer Crime and Forensics (3 credit hours)
– CSCE 557 – Introduction to Cryptography (3 credit hours)
– CSCE 548 – Secure Software Construction (3 credit hours)
– CSCE 727 – Information Warfare (3 credit hours)
– CSCE 813 – Internet Security (3 credit hours)
– CSCE 814 - Distributed Systems Security (3 credits)
– CSCE 824 – Secure Databases (3 credit hours)
– CSCE 798 – Directed Study and Research (max. 3 credit hours)
Computer Science and Engineering
17
Global IA Workforce
Trends
• A Frost & Sullivan Market Survey Sponsored
by International Information Systems
Security Certification Consortium (ISC)2®
• Prepared by Robert Ayoub, CISSP, Global
Program Director, Information Security
• Electronic survey, conducted through a Webbased portal
18
Computer Science and Engineering
18
Demand for IA
Workforce
• Worldwide:
– 2010: 2.28 million
– 2015: 4.24 million (projected)
– Compound Annual Growth Rate: 13.2%
• Americas:
– 2010: 920,845
– 2015: 1,785,236
– Compound Annual Growth Rate: 14.2%
Computer Science and Engineering
Information Warfare - Farkas
19
19
Salary
• 2011 Annual salary(ISC)2® Member/nonmember
• Worldwide: $98,600/$78,500
• Americas: $106,900/$92,900
20
Computer Science and Engineering
20
IA Jobs
• Job market
– Civil (Join Information Systems Security Association, ISSA,
https://www.issa.org/ )
– Government (Internship available at USC-UTS, and SC Dept.
of Probation, Parole, and Pardon Services)
– Military (Internship available at SPAWAR, Charleston)
• Education and training requirements (B.S. degree,
certification, hands-on experiments)
• Salary
• FUN
Computer Science and Engineering
21
IA Research
Csilla Farkas (since 2000)
http://www.cse.sc.edu/~farkas
Application layer
Web data and application (WS & SOA) security,
Access Control Policies, SCADA software reliability,
economic and social impact of cyber attacks
Transport layer
Chin-Tser Huang (since 2003)
http://www.cse.sc.edu/~huangct
Intrusion detection, wireless security, distributed systems
network security, network protocol design and verification
Wenyuan Xu (since 2007)
http://www.cse.sc.edu/~wyxu
Wireless networking and security, sensor networks, network security
and privacy, jamming detection and avoidance
Computer Science and Engineering
22
Internet layer
Network
Interface
Contact Information
Center for Information Assurance Engineering
Department of Computer Science and Engineering
http://www.cse.sc.edu/
Computer Science and Engineering
23
Download