network and information security education
TRANSCRIPT
-
8/3/2019 Network and Information Security Education
1/19
H. Kemal lter, BEng, MBA, PhD
Department of Management Information Systems
Yildirim Beyazit University
Network and Information Security Education
How can we handle it?
ACM
AIS
IEEE
INFORMSISI
SDS
TBD
YAD
November 26, 2011
Atilim UniversityTEN
BLOCKS
-
8/3/2019 Network and Information Security Education
2/19
SCIENCE.COMPUTER
or Computing Science (CS), George Forsythe, 1961
-
8/3/2019 Network and Information Security Education
3/19
Theory of computationInformation and coding theory
Algorithms and data structures
Programming language theory
Formal methods
Concurrent, parallel and distributed systems
Databases and information retrieval
Artificial intelligenceComputer architecture and engineering
Computer graphics and visualization
Computer security and cryptography
Computational science
Information science
Software engineering
Theoretical Applied
-
8/3/2019 Network and Information Security Education
4/19
Computer Engineering
Information Technologies
Information Systems
1
2
3
-
8/3/2019 Network and Information Security Education
5/19
Organizational Issues and
Information Systems
Application Technologies
Software Methods and
Technologies
Systems Infrastructure
Computer Hardware and
Architecture
Theory
Principles
Innovation
Application
Deployment
Configuration
Development
More
Theoretical
More
Applied
The shaded area of the diagram represents the focus of typical curricula of related field ofcomputer science
1
2
3
-
8/3/2019 Network and Information Security Education
6/19
TRENDS.RECENT
-
8/3/2019 Network and Information Security Education
7/19
The emergence ofsecurity as a major area
of concern
The growing relevance ofconcurrency
Security
Concurrency
The pervasive nature ofnet-centric
computing
Net-Centric Computing
-
8/3/2019 Network and Information Security Education
8/19
BLOCKS.TEN
-
8/3/2019 Network and Information Security Education
9/19
Information Security and Risk Management
Security Management Concepts and Principles
Change Control Management Data Classification
Risk Management
Policies, Standards, Procedures and Guidelines
Security Awareness Training
Security Management Planning
Ethics
1
-
8/3/2019 Network and Information Security Education
10/19
Access Control
Access Control Techniques Access Control Administration
Identification and Authentication Techniques
Access Control Methodologies and Implementation
Methods of Attack
Monitoring and Penetration Testing
2
-
8/3/2019 Network and Information Security Education
11/19
Cryptography
Use of Cryptography Cryptographic Concepts, Methodologies, and Practices
Private Key Algorithms
Public Key Infrastructure (PKI)
System Architecture for Implementing Cryptographic Functions
Methods of Attack
3
-
8/3/2019 Network and Information Security Education
12/19
Physical (Environmental) Security
Elements of Physical Security Technical Controls
Environment and Life Safety
4
-
8/3/2019 Network and Information Security Education
13/19
Security Architecture and Design
Principles of Computer and Network Organizations, Architectures,and Designs
Principles of Security Models, Architectures and Evaluation Criteria
Common Flaws and Security IssuesSystem Architecture and Design
5
-
8/3/2019 Network and Information Security Education
14/19
Business Continuity Planning and Disaster
Recovery Planning
Business Continuity Planning
Disaster Recovery Planning
Elements of Business Continuity Planning
6
-
8/3/2019 Network and Information Security Education
15/19
Telecommunications and Network Security
Communications and Network Security Internet, Intranet, Extranet Security
E-mail Security
Secure Voice Communications
Network Attacks and Countermeasures
7
-
8/3/2019 Network and Information Security Education
16/19
Application Security
Application Issues Databases and Data Warehousing
Systems Development Controls
Methods of Attack
8
-
8/3/2019 Network and Information Security Education
17/19
Operations Security
Concepts Resource Protection Requirements
Auditing
9
-
8/3/2019 Network and Information Security Education
18/19
Law, Compliance and Investigations
Information Law Investigations
Major Categories of Computer Crime
Incident Handling
10
-
8/3/2019 Network and Information Security Education
19/19
H. Kemal lter, BEng, MBA, PhD
Department of Management Information Systems
Yildirim Beyazit University
Network and Information Security EducationHow can we handle it?
ACM
AIS
IEEE
INFORMSISI
SDS
TBD
YAD
November 26, 2011
Atilim University
TENBLOCKS