informatics institute 6/19/081 a draft plan for the informatics institute (graduate program)...

26
Informatics Institute Informatics Institute 6/19/08 6/19/08 1 A Draft Plan for the A Draft Plan for the Informatics Institute Informatics Institute ( ( Graduate Program) Graduate Program) A Draft Plan for the Informatics Institute Informatics Institute at AUM for 2008-

Upload: samson-mcdaniel

Post on 29-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Informatics Institute 6/19/08Informatics Institute 6/19/08 11

A Draft Plan for theA Draft Plan for the

Informatics InstituteInformatics Institute((Graduate Program)Graduate Program)

A Draft Plan for the Informatics InstituteInformatics Institute

at AUM for 2008-

Informatics Institute 6/19/08Informatics Institute 6/19/08 22

Primary Foci - Primary Foci - Informatics InstituteInformatics Institute (I- (I-Sq) Sq)

1)1) M.S. and PhD Programs in Informatics Security and M.S. and PhD Programs in Informatics Security and Privacy Assurance and ReliabilityPrivacy Assurance and Reliability

2)2) Cutting-Edge research for first-rate IT programs Cutting-Edge research for first-rate IT programs3)3) External Funding and Research GrantsExternal Funding and Research Grants4)4) Improve relationship with the Gov’t (e.g., the School of Improve relationship with the Gov’t (e.g., the School of

Government) and State (e.g.,Security Awareness)Government) and State (e.g.,Security Awareness)5)5) Improve relationship with IT business community Improve relationship with IT business community6)6) Optimize relationship with 754relationship with 754thth, DHS and application , DHS and application

security firms under “Center of Excellence” projects, (such as security firms under “Center of Excellence” projects, (such as SANcoe: Storage Area Network) and SANcoe: Storage Area Network) and Create surrounding IT surrounding IT industriesindustries

7)7) Expansion of Internationalization of I-Sq Programs to other Expansion of Internationalization of I-Sq Programs to other countries, recruiting of students, and establishment of countries, recruiting of students, and establishment of schools in an outreach exchange program with joint degrees, schools in an outreach exchange program with joint degrees, in addition to the current agreements with Hunan (ROC) and in addition to the current agreements with Hunan (ROC) and Ulsan(ROK).Ulsan(ROK).

Informatics Institute 6/19/08Informatics Institute 6/19/08 33

Organizational Resource Plan for I-SQOrganizational Resource Plan for I-SQ

Director/ DeanFull Prof.(1)

Assoc. Prof. (2)Assist. Prof. (2)

Instructor (4) + Grad. Assts

AUMChancellor/Provost

AUMUndergrad. Departments

Math+DS+Information Systems

Other Undergrad.& Grad Internal, External &

International Students Other SourcesCorporate, IT, Gov’t, DHS, 754th WIngState Etc.

New

Inte

rnat

ional

Schoo

ls an

d

Rec

ruitin

g

Informatics Institute 6/19/08Informatics Institute 6/19/08 44

MS-INDB*Information Networking

- Data Management

Informatics Institute(MS: Master of Science or PhD)

MS-ISPM*MS-ISPM*Information Security, Policy

and Management

MSCS ***Computer Science

MS- IA**Information Assurance

MS-ISITM*Information Security,

Information Technology and IT Management

MS -SECGGT ***Software Engineering, Computer Graphics and Game Technology

AUMChancellor /

Provost

Informatics Institute 6/19/08Informatics Institute 6/19/08 55

Elaborating Item#7 on p.2: Elaborating Item#7 on p.2: The School of GovernmentThe School of Governmente.g.,e.g., 1)1) http://www.sog.unc.edu/programs/index.htmlhttp://www.sog.unc.edu/programs/index.html2) http://www.hks.harvard.edu 3) http://www.victoria.ac.nz/sog/

Graduate School of Government

Business Administration

AndManagement

Political Science And

Public Administration

InternationalRelations andGlobal Affairs

Economics

Information Security, Policy and Management

(MSISPM in I-Sq) slide 2 focus 7 & slide 4

AUMChancellor/Provost

Informatics Institute 6/19/08Informatics Institute 6/19/08 66

Objectives of Objectives of MS-ISPMMS-ISPM

MS-ISPMMS-ISPM Master of Science in Information Security, Master of Science in Information Security,

Policy and ManagementPolicy and Management Balance of Analytical Skills and Business AcumenBalance of Analytical Skills and Business Acumen Emphasizes the multidisciplinary aspects of Emphasizes the multidisciplinary aspects of

Information AssuranceInformation Assurance Unique in its emphasis on the policy, management, Unique in its emphasis on the policy, management,

and technology aspects of information security and technology aspects of information security and risk managementand risk management

Informatics Institute 6/19/08Informatics Institute 6/19/08 77

MS-ISPM as a BridgeMS-ISPM as a Bridge

MS-ISPM as an intersection of S-T-MMS-ISPM as an intersection of S-T-M

Security Policy

Technology

Management

MSISPMMSISPM Bridges Technology, Policy

And Management

Informatics Institute 6/19/08Informatics Institute 6/19/08 88

MARKET Capabilities ofMARKET Capabilities of MS-ISPMMS-ISPM GraduatesGraduates

Graduates from Graduates from MS-ISPMMS-ISPM will be able to: will be able to: Assess Information Security-Reliability-Privacy Risks.Assess Information Security-Reliability-Privacy Risks. Understand the technical, organizational, and human Understand the technical, organizational, and human

factors associated with these risks.factors associated with these risks. Evaluate IT tools to protect against threats facing Evaluate IT tools to protect against threats facing

organizations.organizations. Assess the impact of security policies on complex Assess the impact of security policies on complex

systems and organizational objectives while systems and organizational objectives while considering regulatory requirements and compliance.considering regulatory requirements and compliance.

Oversee the Information Assurance lifecycle including Oversee the Information Assurance lifecycle including planning, acquisition, development, and evolution of planning, acquisition, development, and evolution of secure infrastructuressecure infrastructures. .

Informatics Institute 6/19/08Informatics Institute 6/19/08 99

Summary : Summary : WhyWhy MS-ISPMMS-ISPM??

MS-ISPMMS-ISPM equips candidates with the equips candidates with the analytical methods, technical know-how analytical methods, technical know-how and management practices to be leaders and management practices to be leaders in business and government circles in the in business and government circles in the Information Assurance field.Information Assurance field.

MS-ISPMMS-ISPM is a professionally oriented is a professionally oriented degree with an emphasis on industry degree with an emphasis on industry relevant training to further one’s goals. relevant training to further one’s goals.

Informatics Institute 6/19/08Informatics Institute 6/19/08 1010

An analytical approach to Security Management for An analytical approach to Security Management for training next generation information assurance leaderstraining next generation information assurance leaders

The MS-ISPM Curriculum at a GlanceThe MS-ISPM Curriculum at a Glance:: MS-ISPM is a full-time Masters Program is a full-time Masters Program

completed in four semesters withcompleted in four semesters with An effective mix of core and elective classes Capstone Experience Information Security Project or

Masters Thesis with an expert faculty advisor The ability to exempt core classes based on experience A desirable mix of instructors from industry and research The ability to craft independent study courses with faculty

Informatics Institute 6/19/08Informatics Institute 6/19/08 1111

Sample Curriculum of Sample Curriculum of MS-ISPMMS-ISPM

FALLFALL Introduction to Information SecurityIntroduction to Information Security Security and Reliability Management Security and Reliability Management (MUST)(MUST)

Telecommunications Management Telecommunications Management (MUST)(MUST)

Economics Analysis Economics Analysis (MUST)(MUST)

Statistical Data Analysis for IT Managers Statistical Data Analysis for IT Managers (MUST)(MUST)

Privacy in the Digital AgePrivacy in the Digital Age Hacking ExposedHacking Exposed

Informatics Institute 6/19/08Informatics Institute 6/19/08 1212

Sample Curriculum of Sample Curriculum of MS-ISPMMS-ISPM

SPRINGSPRING Decision Making Under Uncertainty Decision Making Under Uncertainty (MUST)(MUST)

Organizational Management Organizational Management (MUST)(MUST)

Financial Accounting Financial Accounting (MUST)(MUST)

Principles of Finance Principles of Finance (MUST)(MUST)

Applied CryptographyApplied Cryptography NegotiationsNegotiations

Informatics Institute 6/19/08Informatics Institute 6/19/08 1313

Sample Curriculum of Sample Curriculum of MS-ISPMMS-ISPM

SUMMERSUMMER Summer Internship, orSummer Internship, or Master Thesis, orMaster Thesis, or Information Security ProjectInformation Security Project

Informatics Institute 6/19/08Informatics Institute 6/19/08 1414

Sample Curriculum of Sample Curriculum of MS-ISPMMS-ISPM

FALLFALL Security Policy seminars: Healthcare,Security Policy seminars: Healthcare,

Finance and /or Government Finance and /or Government (MUST)(MUST)

Introduction to Computer & Introduction to Computer & Communication Security Communication Security (MUST)(MUST)

Security Architecture & AnalysisSecurity Architecture & Analysis

Informatics Institute 6/19/08Informatics Institute 6/19/08 1515

Sample Curriculum of Sample Curriculum of MS-ISPMMS-ISPM

SPRINGSPRING Project ManagementProject Management Incident ResponseIncident Response Power & InfluencePower & Influence Information Security Risk Analysis Information Security Risk Analysis (MUST)(MUST)

Information Security Risk Policy & Information Security Risk Policy & Management Management (MUST)(MUST)

Informatics Institute 6/19/08Informatics Institute 6/19/08 1616

Elective Pool for Elective Pool for MS-ISPM et al.MS-ISPM et al.

Introduction to Software EngineeringIntroduction to Software Engineering Data Base Concepts and ApplicationsData Base Concepts and Applications Human Factors in Information SystemsHuman Factors in Information Systems Regulatory and Legal Aspects of Information Systems under Regulatory and Legal Aspects of Information Systems under

Cyber-crimeCyber-crime Information Systems Infrastructure for Contemporary Information Systems Infrastructure for Contemporary

OrganizationsOrganizations IT GovernanceIT Governance Defense Analysis: Models and ApplicationsDefense Analysis: Models and Applications E-Government: Transformation and ManagementE-Government: Transformation and Management E-Commerce on the Internet and Security AspectsE-Commerce on the Internet and Security Aspects

Informatics Institute 6/19/08Informatics Institute 6/19/08 1717

Elective Pool Elective Pool Cont’d fromCont’d from p.16 p.16

Total Quality ManagementTotal Quality Management Applied Stochastic Modeling and OptimizationApplied Stochastic Modeling and Optimization Systems Simulation and Operations ManagementSystems Simulation and Operations Management Artificial Intelligence and Expert SystemsArtificial Intelligence and Expert Systems Software Testing and VerificationSoftware Testing and Verification Trustworthy Computing: Metrics in Reliability, Security and Trustworthy Computing: Metrics in Reliability, Security and

PrivacyPrivacy Computer Forensics and InvestigationComputer Forensics and Investigation Computer Law and Ethics under Criminal JusticeComputer Law and Ethics under Criminal Justice Security AuditSecurity Audit Wireless Network Information Security Assessment and Wireless Network Information Security Assessment and

ManagementManagement

Informatics Institute 6/19/08Informatics Institute 6/19/08 1818

MS-INDB*Information Networking

- Data Management

Informatics Institute(MS: Master of Science or PhD)

MS-ISPM*MS-ISPM*Information Security, Policy

and Management

MSCS ***Computer Science

MS- IA**Information Assurance

MS-ISITM*Information Security,

Information Technology and IT Management

MS -SECGGT ***Software Engineering, Computer Graphics and Game Technology

AUMChancellor /

Provost

Informatics Institute 6/19/08Informatics Institute 6/19/08 1919

MS in Information Security, Information MS in Information Security, Information Technology & IT Management (Technology & IT Management (MS-MS-ISITMISITM))

INFORMATION SECURITY TRACKINFORMATION SECURITY TRACK Network Security, Active and Passive DefensesNetwork Security, Active and Passive Defenses Data and Computer Network CommunicationsData and Computer Network Communications Computer Applied SecurityComputer Applied Security CryptographyCryptography Computer and Network AdministrationComputer and Network Administration Fault Tolerance ComputingFault Tolerance Computing Reliability Modeling and EvaluationReliability Modeling and Evaluation Operating SystemsOperating Systems Theory of Automata and Formal LanguagesTheory of Automata and Formal Languages Advance AlgorithmsAdvance Algorithms Information Technology and Cyber-crimeInformation Technology and Cyber-crime

Informatics Institute 6/19/08Informatics Institute 6/19/08 2020

MS in Information Security, Information MS in Information Security, Information Technology & IT Management (Technology & IT Management (MS-MS-ISITMISITM))

INFORMATION-TECHNOLOGY TRACKINFORMATION-TECHNOLOGY TRACK Multimedia Information SystemsMultimedia Information Systems Acquisition of Information SystemsAcquisition of Information Systems Software Quality Assurance and ManagementSoftware Quality Assurance and Management Software Testing and VerificationSoftware Testing and Verification Computer Security and CryptographyComputer Security and Cryptography Software Reliability Modeling Software Reliability Modeling Digital Signal ProcessingDigital Signal Processing

Informatics Institute 6/19/08Informatics Institute 6/19/08 2121

MS in Information Security, Information MS in Information Security, Information Technology & IT Management (Technology & IT Management (MS-MS-ISITMISITM))

IT MANAGEMENT TRACKIT MANAGEMENT TRACK Managerial EconomicsManagerial Economics Business and Project ManagementBusiness and Project Management Information Systems ModelingInformation Systems Modeling Information Resource ManagementInformation Resource Management Management of Information TechnologyManagement of Information Technology Organizational ManagementOrganizational Management Decision Making under UncertaintyDecision Making under Uncertainty Security Risk Assessment and Risk ManagementSecurity Risk Assessment and Risk Management

Informatics Institute 6/19/08Informatics Institute 6/19/08 2222

MS-INDB*Information Networking

- Data Management

Informatics Institute(MS: Master of Science or PhD)

MS-ISPM*MS-ISPM*Information Security, Policy

and Management

MSCS ***Computer Science

MS- IA**Information Assurance

MS-ISITM*Information Security,

Information Technology and IT Management

MS -SECGGT ***Software Engineering, Computer Graphics and Game Technology

AUMChancellor /

Provost

Informatics Institute 6/19/08Informatics Institute 6/19/08 2323

MS in Information Networking MS in Information Networking & Data Management (MS-& Data Management (MS-INDM)INDM)

INFORMATION NETWORKINGINFORMATION NETWORKING Fundamentals of Telecommunications, and Fundamentals of Telecommunications, and

Computer NetworksComputer Networks Fundamentals of Embedded SystemsFundamentals of Embedded Systems Packet Switching and Computer NetworksPacket Switching and Computer Networks Introduction to Computer/Network SecurityIntroduction to Computer/Network Security Secure Software EngineeringSecure Software Engineering Distributed SystemsDistributed Systems Wireless Engineering and Mobile NetworksWireless Engineering and Mobile Networks

Informatics Institute 6/19/08Informatics Institute 6/19/08 2424

MS in Information Networking MS in Information Networking & Data Management (& Data Management (MS-MS-INDMINDM))

DATA MANAGEMENT TRACKDATA MANAGEMENT TRACK Database ApplicationsDatabase Applications Database ManagementDatabase Management Data Storage Design and Systems Data Storage Design and Systems Data Resources ManagementData Resources Management Data Structures and StoragesData Structures and Storages Advanced Database ManagementAdvanced Database Management

Informatics Institute 6/19/08Informatics Institute 6/19/08 2525

MS-INDB*Information Networking

- Data Management

Informatics Institute(MS: Master of Science or PhD)

MS-ISPM*MS-ISPM*Information Security, Policy

and Management

MSCS ***Computer Science

MS- IA**Information Assurance

MS-ISITM*Information Security,

Information Technology and IT Management

MS -SECGGT ***Software Engineering, Computer Graphics and Game Technology

AUMChancellor /

Provost

Informatics Institute 6/19/08Informatics Institute 6/19/08 2626

INFORMATION ASSURANCEINFORMATION ASSURANCE across all environments, across all environments, MS-IAMS-IA

The core curriculum – reviewed and The core curriculum – reviewed and validated by professionals in the field- validated by professionals in the field- provides the fundamental skills needed to provides the fundamental skills needed to lead an information assurance lead an information assurance organization, where business oriented organization, where business oriented classes such as economics, statistics, classes such as economics, statistics, and accounting are instructed from an and accounting are instructed from an information systems perspective.information systems perspective.