200 likes | 296 Views
Building Security In: Workshop – August 2009. Anne Arundel Community Bowie State University Community College of Baltimore County Harford Community College Towson University. Today's Goals. Project: Overview & Status Implementation Details Plan , revise, brainstorm, etc. Agenda.
E N D
Building Security In:Workshop – August 2009 Anne Arundel Community Bowie State University Community College of Baltimore County Harford Community College Towson University
Today's Goals • Project: Overview & Status • Implementation Details • Plan, revise, brainstorm, etc...
Agenda • 10:00-11:00 Introductions Overview Progress from Year 1 Help with assessment? • 11:00-11:15 Plans for Year 2 Details Process • 11:15-12:00 Sample Module + Feedback? Scheduling • 12:00-1:00 Working lunch Sign up on wiki: securityinjections.wikispaces.com What does it take to get this model to be useful? What works? What doesn't? How do we make these materials more effective? Encourage others to use them? • 1-1:15 Wrap-up
OverviewProject Goals and Motivations • Importance of Security • Security Tracks and classes • Too little too late • Insecure coding techniques • Security Injections • Early and often • Minimally invasive
Overview Security Injection Modules • Secure coding “big three” • Integer overflow • Buffer overflow • Input validation • CIS0 • Phishing • Passwords • Confidentiality/Authentication/Integrity • Format of modules • Background – description, risk, examples • Lab Assignment • Checklist • Discussion Questions • Java/C++ versions • Wiki: Securityinjections.wikispaces.com
OverviewSurvey • Sample questions: • What are the possible consequences of insufficient computer security? • Integer overflow occurs.. • demographic questions • Online • http://studentvoice.com/towson/securityawareness09 • Beginning and end of semester • Course names? • CS0, CS1, CS2, Computer Literacy
OverviewKey Points • Collaborative model • TU & Bowie State develop & pilot • AACC, CCBC, Harford deploy • TU and BSU assess and revise • MAISA recreates • CS0, CS1, CS2, CIS0(Literacy), Dbase, Web, Networking
Progress from Year 1 • 23 sections, 16 integrated. • CS 0 3 sections 3 integrated • CS 1 7 sections 5 integrated • CS 2 5 sections 3 integrated • CIS0 5 sections 1 integrated • COSC418 3 sections 0 integrated • 2 papers at CISSE 2009 - Colloquium for Information Systems Security Education, Seattle • Cross-site Security Integration: Preliminary Experiences across Curricula and Institutions • Cooperative Information Assurance Capacity Building
Progress from Year 1:Survey - 534 Responses • Student Institutions • Bowie State 13.2% • CCBC 5.6% • Harford CC 11.4% • Towson 69.6 • Student Gender • Male 70% • Female 30% • Student Ethnicity • White 58% • Black 26% • Asian 7% • Hispanic 2% • Other 6% • Student Standing • Freshman 26% • Sophomore 29% • Junior 28% • Senior 12% • Other 5% • Student Major • Computer Science 25.3% • Computer Info Sys 29.4% • Math 6.3% • Undecided 3.4% • Other 35.0%
Progress from Year 1 Posttest scores for CS0-CS2 students significantly higher than COSC418 students
Progress from Year 1Faculty Survey • 8 instructors • 6 TU + 1 Harford + 1 CCBC • 2 CS0 + 5 CS1 + 1 CS2 • Results (1-5) • Student Interest : 3 (.82 deviation) • Ease of Incorporation: 3.88 (.83) • Extent of distraction from other topics: 1.38(.74) • How helpful were the materials in improving confidence? 3.71 (.95) • Would you recommend? 5 Yes 2 Unsure 1 No answer
Progress from Year 1 • What worked • With the detailed background information, the students were able to work mostly on their own without having to spend a lot of class time discussing the issues. • The idea that we can put them in the lab without much changes. I also liked that the injection was subtle without me talking to the class too much about it, they could link it to coursework implicitly. • After multiple exposure to the checklists, students seemed to get the hang of it. • What didn’t • timing was a problem. • Many students (esp. CIS students) had a difficult time connecting the programming issues to what is really happening • Students resisted reading the writeups, many skipped directly to the problems and googled unfamiliar words and concepts, despite my pointing out that the information was right there. • We need to better connect this information through questions or some other means
Progress from Year 1How can we improve? • Assessment • More students + more institutions • Increase security awareness • Controlled environment – split section • Engaging faculty and students • Awareness and interest surveys • Faculty responses • Specific exercises on quizzes/exams for content
Plans for Year 2 • CS0 • Deploy TU –Taylor, Dierbach ??, Bachman • Pilot/Deploy BSU ?? (we are behind) • Pilot partners • CS1 • Deploy TU – conover, zimand, raj, nadim, staff • Pilot/Deploy BSU • Pilot partners • CS2 • Pilot/Deploy TU – staff (20, hochheiser, zimand, conover • Pilot BSU • CIS0 • Pilot TU -Appiah-Kubi, Mezzanotte • Deploy BSU • Pilot AACC • CISDB • TU – pilot/deploy • Jan 2010 – workshop at CCBC?
Details • materials for CS0, CS1, CS2, CIS0 available on www.securityinjections.wikispaces.com • Identify courses • Sections • Administer surveys
Process • Start of semester • student survey:studentvoice.com/towson/securityawareness09 • Assign modules as appropriate/revise/improve • Use checklists • Retain 4-5 copies of assignments • Assessment • Extra credit questions in tests/exams/quizzes • End of semester • student survey • Faculty survey: http://studentvoice.com/towson/securityinjectionfaculty
CIS0 – where to inject? How? Security Topics Mapping Introduction to Computer Systems Hardware Data Communications and Networking Software Systems Analysis and Design Computer Systems and Organizations Ethical and Societal Issues Technological Trends Testing • Passwords • Phishing • General Security • Input validation • Risk analysis • Cryptography • Spyware/spam • Digital signature • Authorization/id/ authentication • Access control lists
Questions • What will it take to make this work well? • How can we get colleagues to adopt? • What project support is needed? • What institutional support is needed? • Are there issues specific to your context that we should know about?