cybersecurity in the post secondary environment with special emphasis on the role of community...

29
Cybersecurity in the Cybersecurity in the Post Secondary Post Secondary Environment Environment with special emphasis on with special emphasis on The Role Of Community Colleges The Role Of Community Colleges in in Cyber Security Education Cyber Security Education Peter Saflund Peter Saflund Presentation copyright TSI 2003 All rights reserved. Material herein developed in part under a grant from NSF. Opinions expressed herein are those of the investigator and d not represent the opinions of NSF.

Upload: ralph-daniel

Post on 02-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Cybersecurity in theCybersecurity in thePost Secondary EnvironmentPost Secondary Environment

with special emphasis onwith special emphasis onThe Role Of Community Colleges inThe Role Of Community Colleges in

Cyber Security EducationCyber Security Education

Peter SaflundPeter Saflund

Presentation copyright TSI 2003 All rights reserved. Material herein developed in part under a grant from NSF. Opinions expressed herein are those of the investigator and d not represent the opinions of NSF.

Page 2: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

The need for “skilled” workers has The need for “skilled” workers has grown from 20% to 65%.grown from 20% to 65%.

20%

20%60%

20%

45%

35%20%

65%

15%

Source: Bureau of Labor Statistics

1950 1991 2000

Professional Unskilled Skilled

Page 3: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

But, we are not preparing enough But, we are not preparing enough skilled workers.skilled workers.

No HS Diploma 19%

High School 35%Some College 17%

Associate 7%

Bachelors + 22%

Adults > 25 years

Page 4: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Cybersecurity ConferenceCybersecurity ConferenceWashington DC June 26-28, 2002Washington DC June 26-28, 2002

There There isis a valid role for community college a valid role for community college clientele in cyber security!clientele in cyber security!– Security is a many-front issueSecurity is a many-front issue– Important initial gains will come at the Important initial gains will come at the

adaptation and implementation leveladaptation and implementation level– Transport and application layer first line Transport and application layer first line

defenses are vitaldefenses are vital– ““Everyone” must be security consciousEveryone” must be security conscious

Page 5: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

In A Nutshell:

The First Responders Are:

Technicians, Technologists, and Paraprofessionals :

Are on the front lines

Are often the first to know

Educate end users

Gather data and evidence

Advise upper management

Make critical decisions which affect security

And Therefore:

Need education, re-skilling, and certification

Page 6: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

The 8 I. T. Career ClustersThe 8 I. T. Career Clusters

Database Database Development and Development and AdministrationAdministration

Digital MediaDigital Media

Enterprise Systems Enterprise Systems Analysis and Analysis and IntegrationIntegration

Network Design and Network Design and AdministrationAdministration

Programming and Programming and Software Software EngineeringEngineering

Technical Support Technical Support

Technical WritingTechnical Writing

Web Development Web Development and Administrationand Administration

Page 7: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Career ClustersCareer ClustersAre clusters of jobs roles characterized by closely Are clusters of jobs roles characterized by closely related Critical Work Functions and Technical Skillsrelated Critical Work Functions and Technical Skills..

Critical WorkFunctions

PerformanceCriteria

Technical Skills

Foundation Skills

Many individual job roles & titles may exist under each career cluster.

In general lateral and vertical mobility within a cluster is readily facilitated.

Page 8: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Before Sept. 11, 2001Before Sept. 11, 2001

Major vulnerabilities were laptopsMajor vulnerabilities were laptops– Theft, loss of dataTheft, loss of data

Desktop workstations vulnerable to virusesDesktop workstations vulnerable to viruses

Defenses primarilyDefenses primarily– Access control softwareAccess control software– Front door to applicationsFront door to applications– Emphasis on authorized usersEmphasis on authorized users

Page 9: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Early 2000s EnvironmentEarly 2000s EnvironmentDon’t inhibit growthDon’t inhibit growth

Don’t slow down accessDon’t slow down access

Don’t impede processesDon’t impede processes

It’s all aboutIt’s all about– Hooking upHooking up– Building outBuilding out– Gurus talking about value of networks Gurus talking about value of networks

increasing geometrically as the number of increasing geometrically as the number of nodes….every business would be web based nodes….every business would be web based or gone….”first movers” had advantage…..or gone….”first movers” had advantage…..

Page 10: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Early 2000sEarly 2000s

Business Growth and ContinuityBusiness Growth and Continuity– Problems seen as event drivenProblems seen as event driven

Attack simulation wasn’t performedAttack simulation wasn’t performed

Network admin proud of hacker’s lack of Network admin proud of hacker’s lack of success (hero after the fact).success (hero after the fact).

Posture primarily Posture primarily – ResponsiveResponsive– ReactiveReactive

Page 11: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Attacks Are RisingAttacks Are Rising

Page 12: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

With Increasing Economic CostsWith Increasing Economic Costs

0

2

4

6

8

10

12

14

Melissa Code Red Love Bug W32 Worm

$Billions

1999 2000 2001

Page 13: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Dollars, Identity Theft, & I PDollars, Identity Theft, & I P

050

100150200250300350400450500

Iden. Theft I P Fin. Losses

$Millions

FBI Statistics 2000 - 2002

Page 14: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

What’s ChangingWhat’s Changing

New Language EmergingNew Language Emerging– CYBERTERRORISMCYBERTERRORISM– CYBERSECURITYCYBERSECURITY– TRUSTWORTHTY COMPUTINGTRUSTWORTHTY COMPUTING

Government funding coming, but …….Government funding coming, but …….– Need more than rhetoric and ideology.Need more than rhetoric and ideology.– Need recognition that technicians are the “first Need recognition that technicians are the “first

responders” in a cyber attack.responders” in a cyber attack.– Direct $$ to applications as well as research.Direct $$ to applications as well as research.

Page 15: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

The Field of Cyber SecurityThe Field of Cyber Security

Some Generalizations - more or less Some Generalizations - more or less validated……..validated……..– At the application level, security skills will be a part At the application level, security skills will be a part

of virtually all technical jobsof virtually all technical jobs– 2-year grads will not have sole responsibility for 2-year grads will not have sole responsibility for

security audits, policies, strategiessecurity audits, policies, strategies– Many incumbent workers will need or desire Many incumbent workers will need or desire

upgrading and / or certificationupgrading and / or certification– Preparatory programs will require infusion more Preparatory programs will require infusion more

than re-inventionthan re-invention– There will be “Demand Pull” for Cyber SecurityThere will be “Demand Pull” for Cyber Security

Page 16: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Because …Because …

MINDSET AND ACTIONS MUST:MINDSET AND ACTIONS MUST:

Become anticipatoryBecome anticipatory

Assume different scenariosAssume different scenarios

Include coordinated actionInclude coordinated action

Inform the greater cyber communityInform the greater cyber community

Page 17: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Labor Demand PictureLabor Demand Picture

89% of business feel a large scale cyber 89% of business feel a large scale cyber attack will be launched within 2 yearsattack will be launched within 2 years

Almost 60% feel their organization is Almost 60% feel their organization is unprepared to defend againstunprepared to defend against

80% feel the US as a whole is unprepared 80% feel the US as a whole is unprepared to defend againstto defend against

Many large scale attacks have occurred Many large scale attacks have occurred but gone unreported (confidence issues)but gone unreported (confidence issues)

Better mousetraps make better miceBetter mousetraps make better mice

Page 18: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Labor DemandLabor DemandRecent ITAA Workforce study:Recent ITAA Workforce study:– 300,000 new openings300,000 new openings

Robert Half Technology:Robert Half Technology:– Highest growth rates are in Network Design and Highest growth rates are in Network Design and

Administration and Web / Internet (40% of total)Administration and Web / Internet (40% of total)– Network security admin $61K - $85KNetwork security admin $61K - $85K– Systems security admin $62K - $86KSystems security admin $62K - $86K

$633 Billion e-business volume ($633 Billion e-business volume (W.O.W.W.O.W.):):– Behind all this is technicians and technologistsBehind all this is technicians and technologists

I T is now an indispensable partner in most I T is now an indispensable partner in most businessesbusinesses

Page 19: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

2 Main Program Areas2 Main Program Areas

Preparatory Preparatory – Two year professional Two year professional

technical degreestechnical degrees– Two year computer Two year computer

science transfer science transfer degreesdegrees

– Institutional certificatesInstitutional certificates– ““I T Minor” for I T Minor” for

business or sciencesbusiness or sciences– CertificationCertification

Incumbent and re-Incumbent and re-careering workerscareering workers– UpgradingUpgrading– CertificationCertification– Clock hour certificatesClock hour certificates– ““Go-To” for “lifelong” Go-To” for “lifelong”

learninglearning– Career progressionCareer progression– Workforce Workforce

developmentdevelopment

Page 20: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Possible Content AreasPossible Content AreasSystems maintenance, patches, upgradeSystems maintenance, patches, upgrade

Content securityContent security

Data assuranceData assurance

Physical securityPhysical security

User educationUser education

Detection (hacks, probes, etc.)Detection (hacks, probes, etc.)

Deterrence (fire walls, honey pots, etc.)Deterrence (fire walls, honey pots, etc.)

Forensics (evidence gathering, preservation)Forensics (evidence gathering, preservation)

Policy developmentPolicy development

Forward planning and professional developmentForward planning and professional development

Preparation for certificationPreparation for certification

Page 21: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Critical Work Functions

Curriculum

IntegratedActivities

Assessments

Certifications

VendorVendorNeutral

Authentic

Involving

Specifications

Authentic Holistic

Articulation

Page 22: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

What About Security What About Security Certification?Certification?

Tier 1 - Professional Mgmt. (CISSP, CSSA)

Tier 2 - Vendor Specific

(Oracle, Checkpoint) and Vendor Neutral (CIW- SCNP)

Tier 3 - Vendor Neutral

Entry Level & Recarering (S+)

Page 23: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Linear ModelLinear Model

Computer Science

TraditionalPre engineering

TechnicianPara-

professional TechnicalPrograms &

Con. Ed.

4-yearUniver-

sity

WorkPrior Work

Co. TrainingPrior edu.

Prior Certs.

Certificate

Degree

Certification

Page 24: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

More RealisticMore Realistic(Messy Organic Process)(Messy Organic Process)

Work Exp

TechnicalEducation

“Some” College

Certification

Work Exp

CorporateClassroom

ContinuingEducation

TechnicalEducation

UpgradingRe-skilling

Promotion

Page 25: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

The Good NewsThe Good News

Page 26: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Strategies for SuccessStrategies for SuccessUse skill standards to set agreed-upon Use skill standards to set agreed-upon expectations expectations Hold the courseHold the courseWork with local business / industry to develop / Work with local business / industry to develop / refine contentrefine contentMake appropriate use of certificationsMake appropriate use of certificationsDevelop methods to rapidly infuse the latest Develop methods to rapidly infuse the latest security topics and content into curricula, security topics and content into curricula, activities, and assessmentsactivities, and assessmentsDifferentiate between technical and transfer Differentiate between technical and transfer outcomes as appropriateoutcomes as appropriateImplement a comprehensive plan for faculty Implement a comprehensive plan for faculty professional developmentprofessional development

Page 27: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Doing Less With LessDoing Less With LessMore collaborationMore collaboration

InfusionInfusion

Maximize CRMMaximize CRM

Get “appropriated” $$ authorizedGet “appropriated” $$ authorized

Existing and new NSF centers can helpExisting and new NSF centers can help

Take advantage of advantagesTake advantage of advantages– Clear and present solutionsClear and present solutions– Business is “IT – dependent”Business is “IT – dependent”– Flexible cost – effective deliveryFlexible cost – effective delivery

Page 28: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

Some Closing IssuesSome Closing Issues

““Parallel Universes” (Parallel Universes” (AdlemanAdleman))– Relative value of credentials?Relative value of credentials?

Qualify Market OpportunityQualify Market Opportunity– Remember “dot-com entrepreneurs?”Remember “dot-com entrepreneurs?”

Re-Skilling the incumbent workforceRe-Skilling the incumbent workforce– What part of this is really new?What part of this is really new?

Maintain perspectiveMaintain perspective– Perimeter defenses will not the sole answer. Perimeter defenses will not the sole answer. – It is “impossible” to secure a digital system from It is “impossible” to secure a digital system from

digital attack.digital attack.

Page 29: Cybersecurity in the Post Secondary Environment with special emphasis on The Role Of Community Colleges in Cyber Security Education Peter Saflund Presentation

More InformationMore Information

T S IT S I– http://www.saflund.orghttp://www.saflund.org– info@[email protected]– 253.630.5326253.630.5326