1 / 11

IST Degree Programs in Security & Risk Analysis

IST Degree Programs in Security & Risk Analysis. SRA Major SRA Minors Information Assurance. SRA’s Fast Track Success. Spring 2005 - President Spanier’s inspiration Summer 2005 - White paper Fall 2005 - Advisory board meeting Winter 2006 - Curriculum proposal

Télécharger la présentation

IST Degree Programs in Security & Risk Analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IST Degree Programs in Security & Risk Analysis SRA Major SRA Minors Information Assurance

  2. SRA’s Fast Track Success • Spring 2005 - President Spanier’s inspiration • Summer 2005 - White paper • Fall 2005 - Advisory board meeting • Winter 2006 - Curriculum proposal • Spring 2006 - Faculty Senate approval • Summer 2006 – PSU Trustees approval • Fall 2006 – Implementation • Spring 2008 – over 650 @ UP completed SRA 111 • Fall 2008 – nearly 1000 @ UP completed SRA 111

  3. SRA Options for B.S. Major • Intelligence Analysis and Modeling: Skills developed in the strategic and tactical levels of intelligence collection, analysis, and decision-making.  • Information and Cyber-Security: Skills developed in network security, cyber-threat defense, information warfare, and critical infrastructure protection across multiple venues. • Social Factors and Risk: Skills developed in legal, regulatory, ethical, and other social theories associated with security and risk assurance.

  4. SRA Core Curriculum Information, People & Technology (110) Introduction to Security & Risk Analysis (111) Statistics Overview of Information Security (221) Threat of Terrorism & Crime (211) Decision Theory & Analysis (231) Risk Management: Mitigation & Assessment (311) Legal, Ethical & Regulatory Issues (432) International Culture & Foreign Language Emergency Planning & Crisis Management (440) Internships, Guest Speakers & Field Experience

  5. SRA Skills Developed • SRA Curriculum Prepares for SRA Careers • Generalized knowledge • Problem framing • Assessment • Planning, forecasting and alternative evaluation • Analysis Techniques to Protect Critical Infrastructures • Cyber-Infrastructure is Cross-Cutting & IST’s Major Advantages • Specialized knowledge • Threat Analysis Crisis management • Anticipating the criminal/terrorist mindset • Systems-level patterns • Anomaly detection • Cultural and political awareness • Security is Key Outcome for Protection • Privacy is Key Outcome but Sometimes a Balancing Factor with Security

  6. Critical Infrastructure Protection • Basic facilities, services & installations needed for societal functioning • “Infrastructure” • Interdependent networks & systems comprising identifiable industries, institutions & distribution capabilities that • provide a reliable flow of products & services • essential to defense, economic security, smooth govt. functioning & society • “Critical” • national infrastructures • so vital that incapacity or destruction would have a debilitating impact on • defense or economic security • What are the “Critical Infrastructures?” • telecommunications; • electrical power systems; • gas & oil storage & transportation; • banking and finance; • transportation; • water supply systems; • emergency services e.g., medical, police, fire, rescue • continuity of government. • National Defense • Cyber-Infrastructure is the Ultimate Cross-Cutting Cr. Inf.

  7. IST/SRA Curricular Standards • Problem based learning (PBL) • Case studies • Critical Thinking • Project Management • Communication Skills • Teamwork • Internships • Interdisciplinary Coursework & faculty • 3rd year analytical skills capstone (SRA 331) • 4th year capstone (IST 440W) • Optional Study Abroad

  8. Minors in IST & SRA • SRA Related Minors • SRA Minor • Global Security Minor (Pol Sci) • IST Minors • Communication Arts and Sciences (ISCAS) • Earth & Mineral Sciences (ISEMS) • Health Policy Administration (IST/HPA) • Hotel, Inst. Restaurant Mgt (IST/HRIM) • Industrial Engineering (ISTIE) • Labor & Industrial Relations (IST/LER) • Mathematics (IST/MATH ) • Telecommunications (IST/TELCM) • Supply Chain (SCIST) • See: http://ist.psu.edu/currentstudents/undergraduate/minors/page2.cfm?pageID=141

  9. The SRA Minor • All PSU Minors available to any major, minimum 18 credits, SRA=21 credits • Prescribed Courses (15 credits): IST 110 INFORMATION, PEOPLE, & TECHNOLOGY (3) SRA 111 INTRODUCTION TO SECURITY & RISK ANALYSIS (3) SRA 211 THREAT OF TERRIOSM & CRIME (3) SRA 221 OVERVIEW OF INFORMATION SECURITY (3) IST 452 LEGAL & REGULATORY ENVIRONMENT OF PRIVACY & SECURITY (3) • Select 6 Credits from the following areas: (At least 3 credits from 400 level)Risk Management FocusSRA 231 DECISION THEORY & ANALYSIS(3) SRA 311 RISK MANAGEMENT: ASSESSMENT & MITIGATION (3) IST 432 LEGAL & REGULATORY ENVIRONMENT OF INFORMATION SCIENCE & TECHNOLOGY (3) IST 456 SECURITY & RISK MANAGEMENT (3) Network Security FocusIST 220 NETWORKING & TELECOMMUNICATIONS (3) IST 451 NETWORK SECURITY (3) Cyber Forensics FocusIST 453 LEGAL, REGULATORY, & POLICY ENVIRONMENT OF CYBER FORENSICS (3) IST 454 COMPUTER & CYBER FORENSICS (3)

  10. Employment Outlook for SRA Security and privacy services represent the fastest growing segment of IBM's Global Technology Services business. These services include disciplines in information security, asset and risk management with an increasing focus on compliance. In both the public and private sector, there exists heightened interest to protect systems and information assets. Clients are looking for skilled professionals to design and implement comprehensive information security policy that covers a wide range of business security priorities. Since projects of this type focus in some of the most sensitive areas of IT and business systems management, career opportunities are expected to flourish with fast career progression in both professional and management career dimensions.-Dave CassanoIBM Managing Director, Altria Group, Inc.

More Related