180 likes | 270 Views
Center for Information Security: An Overview. October 4th, 2002. CIS Overview. IA Mission: Education, Research and Service CS Faculty Prof. Sujeet Shenoi Prof. Mauricio Papa Prof. John Hale Other faculty in multidisciplinary track (Political Science, Economics, Law, History
E N D
Center for Information Security:An Overview October 4th, 2002 University of Tulsa - Center for Information Security
CIS Overview • IA Mission: Education, Research and Service • CS Faculty • Prof. Sujeet Shenoi • Prof. Mauricio Papa • Prof. John Hale • Other faculty in multidisciplinary track (Political Science, Economics, Law, History • Founded in 1996 • NSA Center of Excellence in Information Assurance Education (2000) • Only school in the country fully compliant with federal INFOSEC training standards University of Tulsa - Center for Information Security
CIS Curriculum • Curriculum Features • IA courses integrated into the CS/IST curricula • 3 IA courses taught each semester • Federal CNSS Certifications offered at TU • CNSS 4011 (Information System Security Professional) • CNSS 4012 (Designated Approving Authority) • CNSS 4013 (System Administrator) • CNSS 4014 (Information System Security Officer) • CNSS 4015 (System Certifier) • 10 CNSS 4011 Certificates awarded in 2001 • 48 CNSS 4011/12/14 Certificates in May 2002 University of Tulsa - Center for Information Security
Information Assurance Courses (Core) University of Tulsa - Center for Information Security
Information Assurance Courses (Electives) University of Tulsa - Center for Information Security
CNSS Course Mappings University of Tulsa - Center for Information Security
CyberCorps • Scholarship for Service • Part of the Cyber Service initiative • Announced in May 2002 • NSF Grant to five Universities • University of Tulsa, Naval Postgraduate School, Iowa State University, Purdue University, University of Idaho and Carnegie Mellon University • Mission • Training of elite squadrons of computer security experts • Defense against Internet hackers and terrorists University of Tulsa - Center for Information Security
CyberCorps Program • Objectives • Enroll 12 new students each year • Open to students in their junior year or first-year graduate students (two-year program) • Grant pays each student’s tuition for two years, room and board, travel to conferences and stipend • Obligations • Students must complete a summer internship in a federal agency at the end of their first year • Two years of service for the Federal Government University of Tulsa - Center for Information Security
CyberCorps Program • Research • Students will conduct research in collaboration with federal scientists toward a Senior Project or Master’s Thesis • Teams: two undergraduates and one graduate student • Outreach Activities • Developing Information Technology Ethics courses for middle and high-school students • Collaborate with the National Memorial Institute for the Prevention of Terrorism in Oklahoma City University of Tulsa - Center for Information Security
Research Projects • Telecommunications Security • Intrusion Detection • Attack Modeling and Visualization • Network Vulnerability Analysis • Computer and Network Forensics • Policy Mediation • Programmable Security • Cryptographic Protocol Verification University of Tulsa - Center for Information Security
Telecommunications Security • DoJ project developing systems for defending PTNs from cyberterrorist attacks • Experimental PTN providing analog, digital and wireless telephony used for research • Convergence networks • SS7, xDSL, ISDN, wireless gateways • Collaboration with NIST and Williams University of Tulsa - Center for Information Security
Intrusion Detection • DoJ project developing robust intrusion detection systems • Specialized software agents monitor network resources, report anomalies and intrusions • Initiate countermeasures • Collaboration with the ISTS/Dartmouth Consortium University of Tulsa - Center for Information Security
Attack Modeling/Visualization • DoJ project developing coherent schemes for monitoring and visualizing Internet attacks in real-time • Java prototype under development • Distributed agents synthesize feedback from IDS into a special language • Subsequently transformed into an integrated graphical representation by centralized monitor University of Tulsa - Center for Information Security
Network Vulnerability Analysis • DoJ project developing tools for mapping IP networks and analyzing vulnerabilities • In the process of including convergence technologies • Information includes operating system profiles and data, IP service fingerprints • SS7 network and wireless gateways • Integrated with an attack model database to support vulnerability analysis University of Tulsa - Center for Information Security
Computer and Network Forensics • Currently supported by Williams Energy Services • Developing state-of-the-art forensic capabilities • Network scanners, IP profilers, chat room monitors, evidence preservation • Tools for recovering and analyzing evidence • Tulsa Police Department’s Cyber Crime Division University of Tulsa - Center for Information Security
Policy Mediation • NSF project using primitive logic and mediator technology • Implement access control and metapolicies • Negotiate authorization policies in federated DB environments • Prototype in Java using JDBC and CORBA • NIST scientists have developed universal policy machines University of Tulsa - Center for Information Security
Programmable Security • NSA and NSF supported project developing programming languages with constructs for programmable security • Primitive ticket-based model used to implement a variety of access control models (DAC, MAC, RBAC and TBAC) • Security checking at compile and runtime University of Tulsa - Center for Information Security
Cryptographic Protocol Verification • Developed a formalism that integrates logic and process calculus components • Support for formal proofs about the protocol, knowledge and behavior of principals • Comprehensive modeling of encrypted and unencrypted messages • Expressive message passing semantics • Constructs for modeling agents • Modeling/Verifying security properties of distributed systems University of Tulsa - Center for Information Security