network and information security education

Upload: h-kemal-ilter

Post on 06-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Network and Information Security Education

    1/19

    H. Kemal lter, BEng, MBA, PhD

    Department of Management Information Systems

    Yildirim Beyazit University

    [email protected]

    Network and Information Security Education

    How can we handle it?

    ACM

    AIS

    IEEE

    INFORMSISI

    SDS

    TBD

    YAD

    November 26, 2011

    Atilim UniversityTEN

    BLOCKS

  • 8/3/2019 Network and Information Security Education

    2/19

    SCIENCE.COMPUTER

    or Computing Science (CS), George Forsythe, 1961

  • 8/3/2019 Network and Information Security Education

    3/19

    Theory of computationInformation and coding theory

    Algorithms and data structures

    Programming language theory

    Formal methods

    Concurrent, parallel and distributed systems

    Databases and information retrieval

    Artificial intelligenceComputer architecture and engineering

    Computer graphics and visualization

    Computer security and cryptography

    Computational science

    Information science

    Software engineering

    Theoretical Applied

  • 8/3/2019 Network and Information Security Education

    4/19

    Computer Engineering

    Information Technologies

    Information Systems

    1

    2

    3

  • 8/3/2019 Network and Information Security Education

    5/19

    Organizational Issues and

    Information Systems

    Application Technologies

    Software Methods and

    Technologies

    Systems Infrastructure

    Computer Hardware and

    Architecture

    Theory

    Principles

    Innovation

    Application

    Deployment

    Configuration

    Development

    More

    Theoretical

    More

    Applied

    The shaded area of the diagram represents the focus of typical curricula of related field ofcomputer science

    1

    2

    3

  • 8/3/2019 Network and Information Security Education

    6/19

    TRENDS.RECENT

  • 8/3/2019 Network and Information Security Education

    7/19

    The emergence ofsecurity as a major area

    of concern

    The growing relevance ofconcurrency

    Security

    Concurrency

    The pervasive nature ofnet-centric

    computing

    Net-Centric Computing

  • 8/3/2019 Network and Information Security Education

    8/19

    BLOCKS.TEN

  • 8/3/2019 Network and Information Security Education

    9/19

    Information Security and Risk Management

    Security Management Concepts and Principles

    Change Control Management Data Classification

    Risk Management

    Policies, Standards, Procedures and Guidelines

    Security Awareness Training

    Security Management Planning

    Ethics

    1

  • 8/3/2019 Network and Information Security Education

    10/19

    Access Control

    Access Control Techniques Access Control Administration

    Identification and Authentication Techniques

    Access Control Methodologies and Implementation

    Methods of Attack

    Monitoring and Penetration Testing

    2

  • 8/3/2019 Network and Information Security Education

    11/19

    Cryptography

    Use of Cryptography Cryptographic Concepts, Methodologies, and Practices

    Private Key Algorithms

    Public Key Infrastructure (PKI)

    System Architecture for Implementing Cryptographic Functions

    Methods of Attack

    3

  • 8/3/2019 Network and Information Security Education

    12/19

    Physical (Environmental) Security

    Elements of Physical Security Technical Controls

    Environment and Life Safety

    4

  • 8/3/2019 Network and Information Security Education

    13/19

    Security Architecture and Design

    Principles of Computer and Network Organizations, Architectures,and Designs

    Principles of Security Models, Architectures and Evaluation Criteria

    Common Flaws and Security IssuesSystem Architecture and Design

    5

  • 8/3/2019 Network and Information Security Education

    14/19

    Business Continuity Planning and Disaster

    Recovery Planning

    Business Continuity Planning

    Disaster Recovery Planning

    Elements of Business Continuity Planning

    6

  • 8/3/2019 Network and Information Security Education

    15/19

    Telecommunications and Network Security

    Communications and Network Security Internet, Intranet, Extranet Security

    E-mail Security

    Secure Voice Communications

    Network Attacks and Countermeasures

    7

  • 8/3/2019 Network and Information Security Education

    16/19

    Application Security

    Application Issues Databases and Data Warehousing

    Systems Development Controls

    Methods of Attack

    8

  • 8/3/2019 Network and Information Security Education

    17/19

    Operations Security

    Concepts Resource Protection Requirements

    Auditing

    9

  • 8/3/2019 Network and Information Security Education

    18/19

    Law, Compliance and Investigations

    Information Law Investigations

    Major Categories of Computer Crime

    Incident Handling

    10

  • 8/3/2019 Network and Information Security Education

    19/19

    H. Kemal lter, BEng, MBA, PhD

    Department of Management Information Systems

    Yildirim Beyazit University

    [email protected] com

    Network and Information Security EducationHow can we handle it?

    ACM

    AIS

    IEEE

    INFORMSISI

    SDS

    TBD

    YAD

    November 26, 2011

    Atilim University

    TENBLOCKS