Cyber Warriors for Cyber Security and Information Assurance- An Academic Perspective

نویسندگان

  • F. Gonzales
  • Gordon W. Romney
  • Pradip Peter Dey
چکیده

A virtualized and virtual approach is presented on academically preparing students to successfully engage at a strategic perspective to understand those concerns and measures that are both structured and not structured in the area of cyber security and information assurance. The Master of Science in Cyber Security and Information Assurance (MSCSIA) is a professional degree for those who endeavor through technical and managerial measures to ensure the security, confidentiality, integrity, authenticity, control, availability and utility of the world’s computing and information systems infrastructure. The National University Cyber Security and Information Assurance program is offered as a Master’s degree. The emphasis of the MSCSIA program uniquely includes hands-on academic instruction using virtual computers. This past year, 2011, the NU facility has become fully operational using system architecture to provide a Virtual Education Laboratory (VEL) accessible to both onsite and online students. The first student cohort completed their MSCSIA training this past March 2, 2012 after fulfilling 12 courses, for a total of 54 units of college credits. The rapid pace scheduling of one course per month is immensely challenging, perpetually changing, and virtually multifaceted. This paper analyses these descriptive terms in consideration of those globalization penetration breaches as present in today’s world of cyber security. In addition, we present current NU practices to mitigate risks. Keywords—Cyber security, information assurance, mitigate risks, virtual machines, strategic perspective.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A DeticA report iN pArtNerSHip WitH tHe office of cyber Security AND iNformAtioN ASSurANce iN tHe cAbiNet office

WitH tHe office of cyber Security AND iNformAtioN ASSurANce iN tHe cAbiNet office. tHe coSt of cyber crime.

متن کامل

Second Annual Cyber Security and Information Infrastructure Research Workshop May 10 - 11 , 2006 BEYOND THE MAGINOT LINE

Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...

متن کامل

Building Secure, Resilient Architectures for Cyber Mission Assurance

Today’s information technology (IT) environments are increasingly subject to escalating cyber attacks. Cyber threats vary widely in sophistication, intent, and the consequences to the targeted systems and networks. The range of attackers extends from users who unintentionally damage systems to hackers, to cyber criminals, to full‐scale cyber spies and cyber warriors; their intentions span from ...

متن کامل

A Systems Engineering Approach for Assured Cyber Systems

Systems Engineering (SE) has gained favor as a means to tame the complexity of modern systems, specifically the design, analysis, and development of complex systems. This paper describes a SE approach for system assurance of modern Information Technology (IT) centric “cyber systems”. In this paper, we discuss recent trends in information security towards the establishment of security patterns a...

متن کامل

Achieve Cyber Security with the Help of Common Criteria Certification Today’s industry and government organizations are highlighting cyber security and information

Today’s industry and government organizations are highlighting cyber security and information assurance as one of their top IT priorities. Cyber threats are presented by both individuals and nation-sponsored groups with intentions spanning the theft of trade secrets, “hacktivism” (the invasion or disruption of systems for activist purposes) and espionage. Similarly, new problems are rising arou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012