1. NM INSTITUTE OF ENGINEERING
AND TECHNOLOGY
1
Cyber Security
Education and Training
BY
AUROBINDO NAYAK
2. 2
Outline
• Why Develop a Cyber Security Center?
• Cyber Security Center Overview
• Objectives
• Budget
3. 3
Why Develop a Cyber Security Center?
Copying or Distribution
of Computer Programs
Cyberstalking
Identity Theft
Transmitting Child
Pornography
Credit Card Fraud
Theft of Intellectual
Property
Unauthorized Access to
Computer
Computer Sabotage
Computer Forgery
Bank Card Fraud
Any Computer Crime
0 5 10 15 20 25 30 35 40 45
Cyber CrimesTypesofcomputer-relatedcrimes.
Percentages of surveyed prosecutor offices with at least one conviction.
4. 4
Why Develop a Cyber Security Center?
Cyber Crimes
0 20 40 60 80 100
1
Reported intrusions to law
enforcement
Internet connection cited
as point of attack more
frequently than internal
systems
Acknowledged financial
losses due to computer
breaches
Detected computer
security breaches within
the last 12 months
32%
74%
80%
90%
Percentage of users surveyed.
Reported intrusions
to law enforcement
Internet connection cited
as point of attack more
frequently than internal
systems
Acknowledged financial
losses due to computer
breaches
Detected computer
security breaches within
the last 12 months
5. 5
Why Develop a Cyber Security Center?
Criminal Watch
http://criminalwatch.com/resources/cybercrime.asp
• United States Internet Crime Task
Force
• Computer Crime and Intellectual
Property Section (CCIPS)
• McAfee Anti-Virus Emergency
Response Team (AVERT)
• Carnegie Mellon CERT Coordinator
Center
6. 6
Why Develop a Cyber Security Center?
Target Audiences
– Person Specific
• Corporate User
• Consumer User
– Device Specific
• Telephones
• Wireless Cell Devices
• Personal Digital Assistants (PDAs)
– Network Specific
• Wireless Carrier’s Transport
• Local Area, Metropolitan Area, and Wireless Area
Networks
• Internet
7. 7
Why Develop a Cyber Security Center?
National Strategy to Secure Cyberspace
– Level 1: Home User and Small Business
– Level 2: Large Enterprises
– Level 3: Critical Sectors
– Level 4: National Priorities
• Military Bases
• Coast Guard Facilities
• Ports of Embarkation/Debarkation
• Vulnerable and Potentially Exploitable
Coastal Area
– Level 5: Global
8. 8
Regional Needs
– Law Enforcement
• Cyber Forensic Training
• Litigation Support
• Analyst Training
• Electronic Evidence and Internet Law Expertise
• Real-Time Search and Seizure
• Authentication Center
• Link Analysis
• Encrypted Vault
– Financial/Banking Institutions
– Health Care Industry
• Health Insurance Portability and
Accountability Act of 1996 (HIPAA)
• Electronic Patient Record
Why Develop a Cyber Security Center?
9. 9
Cyber Security Center Overview
• Background
– September 2002
5th Science Symposium in Savannah
– National Initiatives
• President’s Critical Infrastructure Board
• The National Strategy to Secure Cyberspace
• Cyber Security Research and Development Act
• Location
– Armstrong Atlantic State University
– Department of Information Security
10. 10
Cyber Security Center Overview
• Cyber Security Training and Education
– Pre- and In-Service Professionals
– Public and Private Sectors
• Offerings
– Continuing and Professional
Education Courses
– Certified Training
– Academic Degree Preparation
– Applied Research
– Brokering
11. 11
Objectives
• Sponsor, Coordinate, and Provide
Cyber Security Training to Private and
Public Sector
• Serve as Cyber Security Hub,
Broker, and Resource Center
• Provide Cyber Security Education for
Certification and Academic Degrees
• Conduct and Foster
Cyber Security Research
This information is from the Web site with URL
http://www.ojp.usdoj.gov/nij/sciencetech/slides/fromBJSNCJ193441.pdf
Resource(s)
Attachment E: http://www.ojp.usdoj.gov/nij/sciencetech/slides/fromBJSNCJ193441.pdf
criminalwatch.com - Cybercrime - top 4 headlines (Tuesday, January 14, 2003)
United State Internet Crime Task Force- A non-profit agency comprised of law enforcement officers around the US united for a common cause to stop the exploitation of our Nation's children and curbing internet fraud.
CCIPS (Computer Crime and Intellectual Property Section, US.. Dept. of Justice - Our first recomendation for reporting a PC related cyber crime.
McAfee AVERT (Anti-Virus Emergency Response Team) - The top-ranked anti-virus research center in the world, employing researchers in 16 different countries.
NIPC (National Infrastructure Protection Center- the NIPC's mission is to serve as the U.S. government's focal point for threat assessment, warning, investigation, and response for threats or attacks against our critical infrastructures.
Carnegie Mellon CERT Coordination Center - The foremost online resource to study Internet security vulnerabilities, provide incident response services to sites that have been the victims of attack, publish a variety of security alerts, do research in wide-area-networked computing, and develop information and training to help you improve security at your site.
Resource(s):
Attachment F: http://criminalwatch.com/resources/cybercrime.asp