University of Tulsa Center for Information Security: Overview
180 likes | 292 Vues
Learn about the comprehensive information security programs at University of Tulsa's Center for Information Security. Explore courses, research projects, CyberCorps programs, and more.
University of Tulsa Center for Information Security: Overview
E N D
Presentation Transcript
Center for Information Security:An Overview October 4th, 2002 University of Tulsa - Center for Information Security
CIS Overview • IA Mission: Education, Research and Service • CS Faculty • Prof. Sujeet Shenoi • Prof. Mauricio Papa • Prof. John Hale • Other faculty in multidisciplinary track (Political Science, Economics, Law, History • Founded in 1996 • NSA Center of Excellence in Information Assurance Education (2000) • Only school in the country fully compliant with federal INFOSEC training standards University of Tulsa - Center for Information Security
CIS Curriculum • Curriculum Features • IA courses integrated into the CS/IST curricula • 3 IA courses taught each semester • Federal CNSS Certifications offered at TU • CNSS 4011 (Information System Security Professional) • CNSS 4012 (Designated Approving Authority) • CNSS 4013 (System Administrator) • CNSS 4014 (Information System Security Officer) • CNSS 4015 (System Certifier) • 10 CNSS 4011 Certificates awarded in 2001 • 48 CNSS 4011/12/14 Certificates in May 2002 University of Tulsa - Center for Information Security
Information Assurance Courses (Core) University of Tulsa - Center for Information Security
Information Assurance Courses (Electives) University of Tulsa - Center for Information Security
CNSS Course Mappings University of Tulsa - Center for Information Security
CyberCorps • Scholarship for Service • Part of the Cyber Service initiative • Announced in May 2002 • NSF Grant to five Universities • University of Tulsa, Naval Postgraduate School, Iowa State University, Purdue University, University of Idaho and Carnegie Mellon University • Mission • Training of elite squadrons of computer security experts • Defense against Internet hackers and terrorists University of Tulsa - Center for Information Security
CyberCorps Program • Objectives • Enroll 12 new students each year • Open to students in their junior year or first-year graduate students (two-year program) • Grant pays each student’s tuition for two years, room and board, travel to conferences and stipend • Obligations • Students must complete a summer internship in a federal agency at the end of their first year • Two years of service for the Federal Government University of Tulsa - Center for Information Security
CyberCorps Program • Research • Students will conduct research in collaboration with federal scientists toward a Senior Project or Master’s Thesis • Teams: two undergraduates and one graduate student • Outreach Activities • Developing Information Technology Ethics courses for middle and high-school students • Collaborate with the National Memorial Institute for the Prevention of Terrorism in Oklahoma City University of Tulsa - Center for Information Security
Research Projects • Telecommunications Security • Intrusion Detection • Attack Modeling and Visualization • Network Vulnerability Analysis • Computer and Network Forensics • Policy Mediation • Programmable Security • Cryptographic Protocol Verification University of Tulsa - Center for Information Security
Telecommunications Security • DoJ project developing systems for defending PTNs from cyberterrorist attacks • Experimental PTN providing analog, digital and wireless telephony used for research • Convergence networks • SS7, xDSL, ISDN, wireless gateways • Collaboration with NIST and Williams University of Tulsa - Center for Information Security
Intrusion Detection • DoJ project developing robust intrusion detection systems • Specialized software agents monitor network resources, report anomalies and intrusions • Initiate countermeasures • Collaboration with the ISTS/Dartmouth Consortium University of Tulsa - Center for Information Security
Attack Modeling/Visualization • DoJ project developing coherent schemes for monitoring and visualizing Internet attacks in real-time • Java prototype under development • Distributed agents synthesize feedback from IDS into a special language • Subsequently transformed into an integrated graphical representation by centralized monitor University of Tulsa - Center for Information Security
Network Vulnerability Analysis • DoJ project developing tools for mapping IP networks and analyzing vulnerabilities • In the process of including convergence technologies • Information includes operating system profiles and data, IP service fingerprints • SS7 network and wireless gateways • Integrated with an attack model database to support vulnerability analysis University of Tulsa - Center for Information Security
Computer and Network Forensics • Currently supported by Williams Energy Services • Developing state-of-the-art forensic capabilities • Network scanners, IP profilers, chat room monitors, evidence preservation • Tools for recovering and analyzing evidence • Tulsa Police Department’s Cyber Crime Division University of Tulsa - Center for Information Security
Policy Mediation • NSF project using primitive logic and mediator technology • Implement access control and metapolicies • Negotiate authorization policies in federated DB environments • Prototype in Java using JDBC and CORBA • NIST scientists have developed universal policy machines University of Tulsa - Center for Information Security
Programmable Security • NSA and NSF supported project developing programming languages with constructs for programmable security • Primitive ticket-based model used to implement a variety of access control models (DAC, MAC, RBAC and TBAC) • Security checking at compile and runtime University of Tulsa - Center for Information Security
Cryptographic Protocol Verification • Developed a formalism that integrates logic and process calculus components • Support for formal proofs about the protocol, knowledge and behavior of principals • Comprehensive modeling of encrypted and unencrypted messages • Expressive message passing semantics • Constructs for modeling agents • Modeling/Verifying security properties of distributed systems University of Tulsa - Center for Information Security