Advertisement

A Comprehensive Undergraduate Information Assurance Program

  • Gregory Conti
  • John Hill
  • Scott Lathrop
  • Kenneth Alford
  • Daniel Ragsdale
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)

Abstract

This paper describes the experience of our institution in creating a comprehensive undergraduate information assurance (IA) program. An interdisciplinary approach was undertaken in order to include a larger portion of the student body and faculty and thus influence a broader audience. The program includes a wide variety of mutually supporting information assurance activities including a research center, coursework, an information warfare laboratory, a cyber defense exercise, an outreach program, conferences, trips, summer internships, a guest speaker program, a National Security Agency Liaison program, summer student internships, faculty sabbaticals and a student information warfare club. This paper organizes discussion of these activities into the student experience, building faculty expertise, and organizational support. The catalyst for these activities has been the formation of the Military Academy’s dedicated information assurance research center, the Information Technology and Operations Center (ITOC), and the continuing support from and interaction with the National Security Agency. The primary goal of this paper is to provide a descriptive resource to educators who wish to implement an undergraduate or graduate level information assurance program. It is our sincere hope to inspire and aid others in starting similar programs.

Keywords

Information Assurance Education Information Warfare Computer Security Education Computer Security 

References

  1. Spafford, Eugene H. (1997). “One View of A Critical National Need: Support for Information Security Education and Research.” Testimony Before the US House of Representatives Committee on Science. Washington, DC, February 11.Google Scholar
  2. Bishop, M. 2000. “Academia and Education in Information Security: Four Years Later.” Fourth National Colloquium on Information System Security Education, Washington, DC.Google Scholar
  3. Schou, C., D. Frincke, et al. 2000. “Meeting the Information Assurance Crisis - Now.” EDPACS: The EDP Audit, Control, and Security Newsletter.Google Scholar
  4. Office of the Dean. “Educating Future Army Officers for a Changing World.” United States Military Academy. Available online [accessed December 24, 2002] at http://www.dean.usma.edu
  5. Office of the Dean. “Computing@West Point.” United States Military Academy. Available online [accessed December 29, 2002] at http://www.dean.usma.edu/dean/computingatwestpoint
  6. Ray, C. “Computer Science Program.” United States Military Academy. Available online [accessed December 29, 2002] at http://www.eecs.usma.edu
  7. Dudevoir, G. “Electrical Engineering Program.” United States Military Academy. Available online [accessed December 29, 2002] at http://www.eecs.usma.edu
  8. Blair, J. R. S. “Information Systems Engineering Program.” United States Military Academy. Available online [accessed December 29, 2002] at http://www.eecs.usma.edu/programs/ise/defaulthtm

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Gregory Conti
    • 1
  • John Hill
    • 1
  • Scott Lathrop
    • 1
  • Kenneth Alford
    • 1
  • Daniel Ragsdale
    • 1
  1. 1.Information Technology and Operations Center (ITOC), Department of Electrical Engineering and Computer ScienceUnited States Military AcademyUSA

Personalised recommendations