Cyber Warriors for Cyber Security and Information Assurance- An Academic Perspective
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Cyber Warriors for Cyber Security and Information Assurance- An Academic Perspective

Authors: Ronald F. Gonzales, Gordon W. Romney, Pradip Peter Dey, Mohammad Amin, Bhaskar Raj Sinha

Abstract:

A virtualized and virtual approach is presented on academically preparing students to successfully engage at a strategic perspective to understand those concerns and measures that are both structured and not structured in the area of cyber security and information assurance. The Master of Science in Cyber Security and Information Assurance (MSCSIA) is a professional degree for those who endeavor through technical and managerial measures to ensure the security, confidentiality, integrity, authenticity, control, availability and utility of the world-s computing and information systems infrastructure. The National University Cyber Security and Information Assurance program is offered as a Master-s degree. The emphasis of the MSCSIA program uniquely includes hands-on academic instruction using virtual computers. This past year, 2011, the NU facility has become fully operational using system architecture to provide a Virtual Education Laboratory (VEL) accessible to both onsite and online students. The first student cohort completed their MSCSIA training this past March 2, 2012 after fulfilling 12 courses, for a total of 54 units of college credits. The rapid pace scheduling of one course per month is immensely challenging, perpetually changing, and virtually multifaceted. This paper analyses these descriptive terms in consideration of those globalization penetration breaches as present in today-s world of cyber security. In addition, we present current NU practices to mitigate risks.

Keywords: Cyber security, information assurance, mitigate risks, virtual machines, strategic perspective.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1076642

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1881

References:


[1] R. Boyle & R. Panko, Corporate Computer Security, Pearson, 2013.
[2] M. Tritschler & W. Mackay, UK Smart Grid Cyber Security, KEMA, June 25th 2011.
[3] K. Pugh, Lean-Agile Acceptance Test-Driven Development, Addison Wesley, 2011.
[4] I. Sommerville, Software Engineering, 9th Edition, Addison Wesley, 2010.
[5] C. Pfleeger & S. Lawrence, Analyzing Computing Security, Prentice Hall, 2012.
[6] A. Whitaker & D. Newman, Penetration Testing and Network Defense, Cisco Press, 2006.
[7] NIST, "Joint Task Force Transformation Initiative, Information Security", February 2012.
[8] W. Stallings, Cryptography and Network Security (5th ed.), Pearson, 2011.
[9] J. Byrnes, Cognitive Development and Learning, Allyn Bacon, 2008.
[10] L. Nelson, C. Wysopal, D. Zovi,, & E. Dustin, The Art of Software Security Testing, Addison Wesley, 2007.