1 / 9

Information Assurance Education Today

Information Assurance Education Today. LTC Clifton H. Poole, CISSP, CISM, IAM Information Resources Management College National Defense University. Policy2004 The EDUCAUSE Policy Conference. Computer Security. Information Assurance. Secure Path of Improvement.

holleb
Download Presentation

Information Assurance Education Today

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Assurance Education Today LTC Clifton H. Poole, CISSP, CISM, IAM Information Resources Management College National Defense University Policy2004The EDUCAUSE Policy Conference

  2. Computer Security Information Assurance Secure Path of Improvement IA is an evolutionary process in how information systems are and will be defended in the future. (Gil Duvall, 2004)

  3. Computer security to IA - What Changed? Computer security - measures & controls that ensure the confidentiality, integrity, and availability of information systems (IS) assets including h/w, s/w, firmware, and information being processed, stored and communicated. Information assurance (IA) - information operations that protect and defend information and IS by ensuring their confidentiality,integrity, availability, authentication, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection and reaction [correction] capabilities. *NSTISSI #4009 - Infosec Glossary (Gil Duvall, 2004)

  4. Why the Evolution to IA ? …a significant shift in the distributed computing environment (DCE) (Gil Duvall, 2004)

  5. Centers of Academic Excellence Objective of Program Criteria - The criteria are designed to measure and recognize the depth and maturity of Information Assurance (IA) academic programs, and to stimulate the development of broad-ranging IA programs to meet the varying needs of the student population, including work-force professionals, as well as the employment needs of government and industry. http://www.nsa.gov/ia/academia/caemap.cfm?MenuID=10.1.1.2

  6. DoD civilian employees, military officers and enlisted members • Information Resources Management College (IRMC) • Naval Postgraduate School (NPS ) • Air Force Institute of Technology (AFIT) http://www.defenselink.mil/nii/iasp/DoDMembersMain.htm

  7. Federal Cyber Service: Scholarship for Service This program seeks to increase the number of qualified students entering the fields of information assurance and computer security and to increase the capacity of the United States higher education enterprise to continue to produce professionals in these fields. • Scholarship Track • Capacity Building Track http://www.ehr.nsf.gov/ehr/DUE/programs/sfs/

  8. Other Perspectives Controls IA Standards Gov’t Requirements Course Schedule Inputs Student feedback Faculty feedback IA research Industry practices Competition Stakeholders Needs Outputs A world-class graduate IA program. Resource/Mechanisms Strategic Plan Funding Staff support

More Related