19
LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION COUNTY COLLEGE, ACM EDUCATION BOARD Cyber Science Learning Outcomes Cyber Education Project Learning Outcomes Committee

LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Embed Size (px)

Citation preview

Page 1: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

LAKEFRONT SHERATON HOTELCOLUMBIA, MARYLAND

4-5 NOVEMBER 2014

CO -CHAIRSDAVID S. “HOOT” GIBSON, US AIR FORCE

ACADEMYELIZABETH “BETH” HAWTHORNE, UNION

COUNTY COLLEGE, ACM EDUCATION BOARD

Cyber Science Learning OutcomesCyber Education Project

Learning Outcomes Committee

Page 2: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Learning Outcomes Committee Charterwww.cybereducationproject.org

The primary objective of this effort is to provide the cyber education community with useful guidance on developing undergraduate cyber science curricula.

The Committee will build upon previous works to define related bodies of knowledge and seek diverse perspectives to build an interdisciplinary set of learning outcomes which broadly define cyber science education a the undergraduate level.

The outcomes developed will also be used to guide the development of criteria for cyber science program accreditation.

The Committee will develop learning outcomes which characterize the knowledge, skills, and abilities gained by students in an undergraduate cyber science program.

Ultimately the work of the Committee should lead to a cyber science curricular guidance report formally endorsed by a professional society such as the Association for Computing Machinery (ACM).

Page 3: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Other Cyber Curriculum Development Work

NSA/DHS Center for Academic Excellence (CAE) in Information Assurance/Cyber Defense (IA/CD) Knowledge Units (2014) - www.cisse.info/pdf/2014/2014%20CAE%20Knowledge%20Units.pdf

NICE National Cybersecurity Workforce Framework version 2 (2014) - niccs.us-cert.gov/research/draft-national-cybersecurity-workforce-framework-version-20

Department of Labor Cybersecurity Industry Model (2014) - www.careeronestop.org/competencymodel/competency-models/cybersecurity.aspx

Military Academy CYBER Education Working Group, Draft Body of Knowledge and Draft Outcomes, unpublished, 2014.

Page 4: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Other Cyber Curriculum Development Work cont’d

ACM ITiCSE Working Group Papers (2009-2011) An Exploration of the Current State of Information Assurance

Education (2009) - dl.acm.org/citation.cfm?id=1709457 Towards Information Assurance (IA) Curricular Guidelines

(2010) - dl.acm.org/citation.cfm?id=1971686 Information Assurance Education in Two- and Four-Year Institutions

(2011) - dl.acm.org/citation.cfm?id=2078860 ACM/IEEE-CS Curriculum Guidelines for Undergraduate

Degree Programs in Computer Science: IAS KA (2013, p. 99) – cs2013.org

ACM Toward Curricular Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training (2013) – www.acm.org/education/TowardCurricularGuidelinesCybersec.pdf

Page 5: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Other Cyber Curriculum Development Work cont’d

CERT Software Assurance Curricula All Volumes - www.cert.org/curricula/software-assurance-curriculum.cfm

CERT Software Assurance Curriculum Project Volume II: Undergraduate Course Outlines (2010) - resources.sei.cmu.edu/library/asset-view.cfm?assetID=9543

CERT Software Assurance Curriculum Project Volume IV: Community College Education (2011) - resources.sei.cmu.edu/library/asset-view.cfm?assetID=10009

Page 6: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Other Cyber Curriculum Development Work cont’d

U.S. Department of Energy Essential Body of Knowledge (EBK): A Competency and Functional Framework For Cyber Security Workforce Development (2010) - energy.gov/sites/prod/files/cioprod/documents/DOE_EBK_June_2010_Revision_clean_v01public.pdf

DHS IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development (2007) - www.amcleod.com/mcleod9.pdf

(ISC)2 Common Body of Knowledge - www.isc2.org/cbk/

Page 7: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Why the Learning Outcomes Approach?

Focus is on student achievement rather than on existing disciplines and courses (minimizes turf wars concerning who is in and who is out)

Supports inclusive approach (it is easier to add many outcomes than many whole courses of study)

Supports development of new courses in a new and evolving discipline

Avoids traditional body of knowledge focus on topics and contact hours that can grow unbounded as new technologies emerge What topics are eliminated to make room for the new?

Page 8: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Why the Learning Outcomes Approach?

LOs: statements describe what students will be able to do as a result of learning

LOs: students understand expectations and faculty can focus on student achievement

LOs: specific measurement of student achievement having a specific minimum acceptable standard to pass (a threshold level)

Page 9: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Why the Learning Outcomes Approach?

LOs are Active action verbs describe what students should be able to do

LOs can be Aligned aligned with the rest of the curriculum; so LOs

contribute to achievement of course outcomes, which in turn contribute to program outcomes

LOs are Achievable written at the threshold level for a pass, not aspirational

LOs can be Assessed possible to assess several learning outcomes with one

assignment and can also be assessed informally, based on classroom tasks or discussions

Page 10: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Example Learning Outcomes

Bloom’s Revised Taxonomy – acmccecc.org/BloomsTaxonomy/

CS2013 – Information Assurance and Security Knowledge Area (IAS KA)

Foundational Concepts in Security Knowledge Unit LOs Analyze the tradeoffs of balancing key security

properties (Confidentiality, Integrity, and Availability)

Describe the concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security).

Page 11: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Example Learning Outcomes cont’d

CS2013 IAS KA cont’dDefensive Programming KU LOs

Explain why input validation and data sanitization is necessary in the face of adversarial control of the input channel.

Demonstrate using a high-level programming language how to prevent a race condition from occurring and how to handle an exception.

Network Security KU LOs Describe the architecture for public and private key

cryptography and how public key infrastructure (PKI) supports network security.

Describe virtues and limitations of security technologies at each layer of the network stack.

Page 12: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Example Learning Outcomes cont’d

CS2013 IAS KA cont’dSecurity Policy and Governance KU LOs

Describe how privacy protection policies run in conflict with security mechanisms

Identify the risks and benefits of outsourcing to the cloud

Digital Forensics KU LOs Describe the legal requirements for use of seized

data. Conduct data collection on a hard drive.

Page 13: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Activity

What should students learn in cyber science?What common categories have emerged?

The following slides show the technical and non-technical categories of answers placed on sticky notes.

Page 14: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

“Technical Sticky Clumps”In no particular order

AttackCryptographyData AnalysisDatabaseDefenseEthical HackingForensicsHardwareICS/SCADA

Math MobileNetworksOperating

SystemsProgrammingReverse

EngineeringSecure SoftwareTelecom

Page 15: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

“Non-Technical Sticky Clumps”In no particular order

Basic PrinciplesEducationEthicsHuman FactorsLifecycleOrganizationsPolicy, Governance and LawPrivacy & ConfidentialityRecoveryRisk ManagementStrategy

Page 16: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Additional topics from follow-up meeting

Threat landscapePsychological

operationsBusiness continuity,

recoveryRisk managementGovernance (triad with

policy and law)International

standards, policy, and law

Resilience

IntelligenceEconomicsEmbedded systemsSystems designSystem safetySupply chainArtificial

intelligenceLinguisticsHistory

Page 17: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Follow-on Questions

How should cyber science outcomes differ from computer science outcomes?

What is the best technical and non-technical mix?

Who are the subject matter experts?What other questions should we ask? Do you currently have a program in “cyber”

or are you considering developing one?What makes your cyber program different

from other computing-based programs?

Page 18: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Learning Outcomes Development Timeline

Early Dec 2014 – on-line organizational meeting Define roles of committee members and topic area leads Establish learning outcome format and repository Establish dates and locations for future meetings

Jan-Feb 2015 – on-line meetings Discuss development of cyber science learning outcomes

March 2014 – Face-to-face meeting (2 days) Draft cyber science learning outcomes document

June 2015 – Present work at CEP WorkshopFall 2015 – Broad review and comment on

outcomesSpring 2016 – Publish learning outcomes report

Page 19: LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION

Getting Involved in Outcome Development

Sign-up at: www.cybereducationproject.org

Or contact Committee Co-chairs Beth or Hoot: Beth Hawthorne: [email protected] David “Hoot” Gibson: [email protected]