YPSILANTI – Eastern Michigan University is now offering an exciting and challenging Bachelors degree in Information Assurance. The program provides the student with the flexibility that prepares the student with the foundational education to pursue an advanced research degree or the student may elect a more applied professional track leading to employment in the Information Assurance field after graduation. There are three unique concentrations – Management IA, Applied IA and IA Cryptography.
The unique interdisciplinary nature of information assurance requires a diverse educational approach. Most of today?s computer science programs are not sufficiently prepared to educate tomorrow?s cyber defenders. The purpose of this undergraduate interdisciplinary program is to:
Meet society?s need for educated professionals in Information Assurance.
Provide its graduates with the knowledge and skills required to protect the informational technology needs of society which includes all government branches and the private sector.
To propagate a new generation of research scientists in information assurance.
As an National Security Agency (NSA) Academic Excellence in Information Assurance Education, the program offers tremendous opportunities that are excellent preparation for an advanced degree in Information Assurance
What is Information Assurance?
The term Information Assurance encompasses the scientific, technical, and management disciplines required to ensure computer and network security, such as:
Systems/network administration and operation.
Systems security engineering.
Information assurance systems and product acquisition.
Cryptography.
Threat and vulnerability assessment (includes risk management).
Web security.
Computer emergency response team operations.
Information assurance training, education and management.
Computer forensics.
Defensive information operations.
Background
Recently the United States congress has begun to truly understand the magnitude of the threat that the information technology infrastructure of United States is facing. A report issued by the subcommittee on Cyber Security, Science and Research Development stated:
?September 11, 2001, changed the life of each and every American and brought to the forefront a compelling need to change how the federal government is organized to meet new and emerging challenges to our homeland and national security? A growing yet underestimated threat is that of a cyber attack on U.S. critical information infrastructures. Criminals, terrorists, and foreign governments are exploiting the anonymity and global reach of the Internet to attack the U.S. information infrastructure; perform reconnaissance for physical attack; conduct hostile information operations; steal money, identities, and secrets; and potentially undermine the U.S. economy. In many respects this threat is escalating due to the increased availability of automated tools for malicious actions, the complexity of the technical environment, and the increased dependence of our society on interconnected systems.?
The Need for Qualified Professionals
To meet this challenge the nation must build the educational foundation to foster the development of industry and government professionals that are capable of researching critical information assurance solutions, implement applied information assurance and actively protect our information technology infrastructure. The problems faced by both government and industry require a coordinated and cohesive approach to education.
?In order to create an educated workforce, the United States must have in place educational programs to provide future information technology professionals with specialized skills in information security. The increasing threats to and vulnerabilities of the nation?s computer systems have increased the need for such an educated and skilled workforce. System administrators and cybersecurity professionals are the first line of defense for cybersecurity.?
?? To meet the increasing need for cybersecurity professionals, funds should be identified for developing programs and regional laboratories at universities, colleges, and community colleges to educate information technology professionals about cybersecurity. These academic institutions are the ones that serve their regional workforces and can quickly develop relevant programs and curricula based on their ties with local businesses. For example, the student bodies of community colleges include first-generation college students and workers seeking further education or training for new careers. As such, these institutions are also in the best position to develop a culture of security within their communities to ensure that all citizens are part of the plan to defend our homeland. ?
NSA Center of Academic Excellence
Eastern Michigan University?s Center of Academic Excellence is one of 78 federally designated Centers of Academic Excellence in Information Assurance Education in the nation. This valued designation provides the students with a wealth of research, scholarship and educational opportunities. The National Centers of Academic Excellence in Information Assurance Education (CAEIAE) Program is an outreach program designed and operated by the National Security Agency (NSA) and the Department of Homeland Security (DHS) in support of the President’s National Strategy to Secure Cyberspace. The goal of the program is to reduce vulnerability in our national information infrastructure by promoting higher education in information assurance.
Bachelors Degree in Information Assurance
1. Information Assurance Management
Foundational Focus
Ensure Enterprise Legal, Regulatory and Ethical compliance
Develop, Design and Implement Security Policy
Apply Security Policy through
Vulnerability Assessments
Risk Analysis
Countermeasure Deployment
Protect Enterprise Data
Confidentiality
Availability
Integrity
Concentration includes:
Organizational Behavior and Theory
Managerial Communication: Theory and Application
Management Responsibility and Ethics
Policy Development in Info Security
Enterprise Resource Planning
Information Technology Infrastructure and Security
Project Management
End User Systems: Planning and Design
Cyber space Law
2. Applied Information Assurance
Foundational Focus
Application of Computer Crime
Analysis
Prevention
Deterrence
Countermeasures
Forensics
Directed Research for Final Project
Hands-on education in a laboratory setting
Further advanced study at the Graduate Level
Concentration includes:
Administration of Computer Systems
End-User Systems: Planning and Design
Linux Security Administration
Policy Development in Info Security
Cyber Crime Investigation
Computer Forensics
Applied Cryptography
IT Infrastructure and Security
Cyber space Law
Database Adminstration
3. Information Assurance Encryption
Foundational Focus
Application of Public Key Cryptography Techniques
Cryptography
Logic and mathematical background
Concepts
Implementation
Organizational Considerations such as
Ethics
Complexity
Cost / Benefit
System Performance Issues
Directed Research for Final Project
Further advanced study at the Graduate Level
Concentration includes:
Calculus I
Mathematical Logic
Mathematical Modeling
Applied Cryptography
Advanced Cryptography
Cyber space Law
Computational Discrete Structures
IT Infrastructure and Security
For More Information;
Email [email protected]





