06.02.2013 Views

Winter 2008-09 - Pennsylvania College of Technology

Winter 2008-09 - Pennsylvania College of Technology

Winter 2008-09 - Pennsylvania College of Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2 One <strong>College</strong> Avenue<br />

Keeping<br />

‘Hackers’<br />

at Bay<br />

New IT Major Focuses on Safeguarding Data<br />

by Tom Wilson, writer/editor-PCToday<br />

hether it’s the Hollywood hacking <strong>of</strong><br />

the Pentagon’s war machine or the very<br />

real breach <strong>of</strong> credit-card information<br />

on file with a national retailer, stories <strong>of</strong><br />

compromised computer security have<br />

become commonplace.<br />

Quickly reacting to that threat,<br />

<strong>Pennsylvania</strong> <strong>College</strong> <strong>of</strong> <strong>Technology</strong><br />

in Fall <strong>2008</strong> began <strong>of</strong>fering a four-year<br />

degree (information technology: information<br />

technology security specialist concentration)<br />

focusing on protection <strong>of</strong> an organization’s<br />

data from hostile and accidental intrusions.<br />

Students in the college’s School <strong>of</strong> Business<br />

and Computer Technologies can enhance<br />

their marketability by acquiring a set<br />

<strong>of</strong> skills demanded by the 21 st -century<br />

workplace.<br />

The U.S. Department <strong>of</strong> Homeland<br />

Security has collaborated with a number<br />

<strong>of</strong> organizations to set security standards<br />

for government-used computer systems,<br />

including curriculum guidelines<br />

disseminated by the National Security<br />

Agency. Jacob R. Miller, associate pr<strong>of</strong>essor<br />

<strong>of</strong> computer science, and Sandra Gorka,<br />

assistant pr<strong>of</strong>essor <strong>of</strong> computer science,<br />

said the new bachelor’s degree implements<br />

two <strong>of</strong> those standards – a core curriculum<br />

and a risk-analyst specialization – with a<br />

number <strong>of</strong> other specialties to be added as<br />

the major grows.<br />

NSA already has certified the<br />

curriculum through its Information<br />

Assurance Courseware Evaluation<br />

program, which ultimately could allow<br />

the college to be designated as a National<br />

Center for Academic Excellence in the field.<br />

The credential, valid through June 2013,<br />

confirms for employers that Penn <strong>College</strong><br />

students have completed a course <strong>of</strong> study<br />

compliant with NSA’s published standards.<br />

Students in the isolated security laboratory<br />

bring “hacking” out <strong>of</strong> the shadows, identifying<br />

and analyzing computer threats.<br />

“For government agencies, this core<br />

curriculum is becoming a necessity <strong>of</strong><br />

employment,” Miller said. “Having the<br />

background prior to being hired gives our<br />

students a competitive edge over those<br />

who would otherwise have to be sent to<br />

training.”<br />

The college <strong>of</strong>ficially was certified<br />

during the 12 th Colloquium for Information<br />

Systems Security Education, held in early<br />

June in Dallas.<br />

The relative speed <strong>of</strong> that curricular<br />

review speaks both to the need for qualified<br />

graduates and the quality <strong>of</strong> the college’s<br />

existing IT curriculum. When he and his<br />

colleagues sat down to realign the security<br />

majors with what the market demands,<br />

Miller said, “We weren’t that far <strong>of</strong>f ” from<br />

NSA expectations.<br />

The curriculum also has the blessing<br />

<strong>of</strong> the school’s corporate advisers, many <strong>of</strong><br />

whom – health-care providers and financial<br />

institutions, for instance – worry daily<br />

about the data disaster that could result<br />

from a vulnerable information system.<br />

Miller and Gorka explained that Penn<br />

<strong>College</strong>’s new major even transcends NSA<br />

requirements in adding a component<br />

that will give graduates the edge in the<br />

job market. Not only can students learn<br />

to create and implement comprehensive<br />

security plans, they will be introduced to<br />

the process <strong>of</strong> investigating a computer<br />

incident using forensic techniques.“We all<br />

strongly believe that we should be able to<br />

demonstrate that the curriculum delivers<br />

what the student is paying for. The first step<br />

in that direction was the NSA evaluation,”<br />

Miller said. “As the curriculum rolls out,<br />

we will be assessing students to identify<br />

what knowledge they are obtaining from<br />

the curriculum. This enables us to plan for<br />

eventual changes in delivery and content<br />

that will ensure that the curriculum<br />

remains current and delivers as promised.”<br />

With each day’s news bringing more<br />

examples <strong>of</strong> cybercrimes large and small,<br />

a variety <strong>of</strong> government and privatesector<br />

security positions is likely to<br />

await graduates in the new major. The<br />

coursework is not for everyone – faculty<br />

members stress the need for strong math<br />

skills, including calculus – but successful

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!