Transcript Slide 1

Whitacre College of Engineering Panel
Interdisciplinary Cybersecurity Education
Texas Tech University NSF-SFS Workshop on Educational
Initiatives in Cybersecurity for Critical Infrastructure
Panel Members: S. D. Urban (IE), Qing Hui (ME),
Brian Nutter (EE), Sunho Lim (CS)
November 9, 2012
Support for this work was provided by the National Science Foundation’s Federal
Cyber Service: Scholarship for Service (SFS) program under Award No. 1241735.
Any opinions, findings, and conclusions or recommendations expressed in this
material are those of the author(s) and do not necessarily reflect the views of the
National Science Foundation.
Course Plan
Cybersecurity Certificate and Concentration Options
Mechanical Engineering


ME 4334 Feedback Control of Dynamic Systems (D)

Analysis and design of control systems, including applications to
electromechanical systems

Feedback control to modify behavior of dynamic systems

Change to stability, transient response, and steady-state error through
dynamic compensation

Modern control through state-space models
ME/Math 5312 Control Theory I (D)

First course in advanced control theory

Linear systems theory

Robust and optimal control

Introduction to stochastic control

Model reduction and control of large-scale systems
Mechanical Engineering


ME 5314 Nonlinear Dynamics (D)

Analysis of complex and nonlinear dynamic systems

Stability and robustness

Bifurcation, catastrophe, and chaos

Time-series analysis
ME 4331/5331 Networked and Industrial Control Systems (D)

Hierarchical and distributed control systems

Control of stochastic systems

Communication protocols

Effects of communication delay and network dynamics

Fault detection and recovery

Cybersecurity for networked and industrial control systems
Electrical and Computer Engineering




ECE 4325/5325 Telecom Networks (D)

Provides a wide breadth of practices for network engineers

Network security, encryption, scrambling, reliability, spoofing

Network traffic analysis and packet sniffing
ECE 4375/5375 Computer Architecture (D)

Provides a wide breadth of practices for device designers

Protection of intellectual property

Trustworthy computing architectures
ECE 4380/5380 Embedded Systems (D)

Provides a wide breadth of practices for system designers

Protection of intellectual property

Trustworthy computing algorithms
ECE 5331 Cybersecurity for Smartgrids (E)

Risk factors for SCADA and other infrastructure elements

Security methods, procedures, and vulnerabilities
Industrial Engineering



IE 4331/5331Cybersecurity for Information Systems (E/L)

Provides a wide breadth of practices for information system security

Covers the DHS essential body of knowledge

Competencies for data security, digital forensics, enterprise continuity, incident
management,

Information systems operation/maintenance, network security

Personal/physical security, legal/regulatory compliance, risk management
IE 4331/5331 Software Security (D)

Address the secure software development process.

Systems engineering/software interface, attack vulnerabilities

Acquisition strategies for security

Elicitation and analysis, design patterns, secure code, testing

Dependability, reliability, software assurance, life cycle integration
Define critical infrastructure case studies for each of the above courses.
Industrial Engineering

IE 4331/5331 Cyber Attacks

Cyber attack capabilities, attack technologies, engineering attack and defense
 Civilian and military policy, ethics of cyber attacks, societal impacts
 Possibly co-taught with Dr. Vickie Sutton from the Law School
IE 5308 Risk Assessment of Human Behavior (D)

Risk calibration and analysis

Multiple risk aggregation

Group decisions

Potential Enhancement: Define security specific modules on issues and/or critical
infrastructure case studies
IE 5309 Risk Modeling and Assessment (D)






Risk analysis and management
Risk analysis methods
Failure consequences, data for risk management, risk communication
Potential Enhancement: Define security specific modules on issues and/or critical
infrastructure case studies
Computer Science


5332 Secure Software Engineering (D)

Secure requirements specifications

Secure software design

Validation (assessment) of security properties in requirements modeling and
design

Secure programming

Testing for security properties (security assurance)
4331/5331 Information Assurance and Security (D)

Symmetric and public key cryptography, hash functions, cryptanalysis

Authentication, authorization, security protocols

Software flaws, software malware, reverse engineering

Digital rights management, trusted operating systems
Computer Science



4331/5331 Network Security (D)

Network security threats and issues

Cryptography and cryptographic protocol

Firewall, Virtual private network (VPN), IPSec

Network intrusion detection, wireless network security protocol
4331/5331 Opportunistic Mobile Networks (D)

Networks architecture and protocols - ad hoc networks (MANETs), wireless
sensor networks (WSNs) focused

Routing, broadcast, caching, and medium access control (MAC) protocols

Potential Enhancement: Secure routing and MAC protocols
4331 Embedded Systems (D)

Embedded software and hardware architecture

Intel ® Atom-specific architecture and its characteristic

Embedded programming

Potential Enhancement: Secure embedded software and programming