YPSILANTI – Eastern Michigan University is now offering an exciting and challenging Bachelors degree in Information Assurance. The program provides the student with the flexibility that prepares the student with the foundational education to pursue an advanced research degree or the student may elect a more applied professional track leading to employment in the Information Assurance field after graduation. There are three unique concentrations – Management IA, Applied IA and IA Cryptography.

The unique interdisciplinary nature of information assurance requires a diverse educational approach. Most of today?s computer science programs are not sufficiently prepared to educate tomorrow?s cyber defenders. The purpose of this undergraduate interdisciplinary program is to:

Meet society?s need for educated professionals in Information Assurance.

Provide its graduates with the knowledge and skills required to protect the informational technology needs of society which includes all government branches and the private sector.

To propagate a new generation of research scientists in information assurance.

As an National Security Agency (NSA) Academic Excellence in Information Assurance Education, the program offers tremendous opportunities that are excellent preparation for an advanced degree in Information Assurance

What is Information Assurance?

The term Information Assurance encompasses the scientific, technical, and management disciplines required to ensure computer and network security, such as:

Systems/network administration and operation.

Systems security engineering.

Information assurance systems and product acquisition.

Cryptography.

Threat and vulnerability assessment (includes risk management).

Web security.

Computer emergency response team operations.

Information assurance training, education and management.

Computer forensics.

Defensive information operations.

Background

Recently the United States congress has begun to truly understand the magnitude of the threat that the information technology infrastructure of United States is facing. A report issued by the subcommittee on Cyber Security, Science and Research Development stated:

?September 11, 2001, changed the life of each and every American and brought to the forefront a compelling need to change how the federal government is organized to meet new and emerging challenges to our homeland and national security? A growing yet underestimated threat is that of a cyber attack on U.S. critical information infrastructures. Criminals, terrorists, and foreign governments are exploiting the anonymity and global reach of the Internet to attack the U.S. information infrastructure; perform reconnaissance for physical attack; conduct hostile information operations; steal money, identities, and secrets; and potentially undermine the U.S. economy. In many respects this threat is escalating due to the increased availability of automated tools for malicious actions, the complexity of the technical environment, and the increased dependence of our society on interconnected systems.?

The Need for Qualified Professionals

To meet this challenge the nation must build the educational foundation to foster the development of industry and government professionals that are capable of researching critical information assurance solutions, implement applied information assurance and actively protect our information technology infrastructure. The problems faced by both government and industry require a coordinated and cohesive approach to education.

?In order to create an educated workforce, the United States must have in place educational programs to provide future information technology professionals with specialized skills in information security. The increasing threats to and vulnerabilities of the nation?s computer systems have increased the need for such an educated and skilled workforce. System administrators and cybersecurity professionals are the first line of defense for cybersecurity.?

?? To meet the increasing need for cybersecurity professionals, funds should be identified for developing programs and regional laboratories at universities, colleges, and community colleges to educate information technology professionals about cybersecurity. These academic institutions are the ones that serve their regional workforces and can quickly develop relevant programs and curricula based on their ties with local businesses. For example, the student bodies of community colleges include first-generation college students and workers seeking further education or training for new careers. As such, these institutions are also in the best position to develop a culture of security within their communities to ensure that all citizens are part of the plan to defend our homeland. ?

NSA Center of Academic Excellence

Eastern Michigan University?s Center of Academic Excellence is one of 78 federally designated Centers of Academic Excellence in Information Assurance Education in the nation. This valued designation provides the students with a wealth of research, scholarship and educational opportunities. The National Centers of Academic Excellence in Information Assurance Education (CAEIAE) Program is an outreach program designed and operated by the National Security Agency (NSA) and the Department of Homeland Security (DHS) in support of the President’s National Strategy to Secure Cyberspace. The goal of the program is to reduce vulnerability in our national information infrastructure by promoting higher education in information assurance.

Bachelors Degree in Information Assurance

1. Information Assurance Management

Foundational Focus

Ensure Enterprise Legal, Regulatory and Ethical compliance

Develop, Design and Implement Security Policy

Apply Security Policy through

Vulnerability Assessments

Risk Analysis

Countermeasure Deployment

Protect Enterprise Data

Confidentiality

Availability

Integrity

Concentration includes:

Organizational Behavior and Theory

Managerial Communication: Theory and Application

Management Responsibility and Ethics

Policy Development in Info Security

Enterprise Resource Planning

Information Technology Infrastructure and Security

Project Management

End User Systems: Planning and Design

Cyber space Law

2. Applied Information Assurance

Foundational Focus

Application of Computer Crime

Analysis

Prevention

Deterrence

Countermeasures

Forensics

Directed Research for Final Project

Hands-on education in a laboratory setting

Further advanced study at the Graduate Level

Concentration includes:

Administration of Computer Systems

End-User Systems: Planning and Design

Linux Security Administration

Policy Development in Info Security

Cyber Crime Investigation

Computer Forensics

Applied Cryptography

IT Infrastructure and Security

Cyber space Law

Database Adminstration

3. Information Assurance Encryption

Foundational Focus

Application of Public Key Cryptography Techniques

Cryptography

Logic and mathematical background

Concepts

Implementation

Organizational Considerations such as

Ethics

Complexity

Cost / Benefit

System Performance Issues

Directed Research for Final Project

Further advanced study at the Graduate Level

Concentration includes:

Calculus I

Mathematical Logic

Mathematical Modeling

Applied Cryptography

Advanced Cryptography

Cyber space Law

Computational Discrete Structures

IT Infrastructure and Security

For More Information;

Email [email protected]