This project intends to organize a summit on education in secure software. metropolitan area. The summit brings together a multi-disciplinary group of experts in secure coding to develop a comprehensive agenda focused on the challenges of secure software education. Summit participants include representatives from academia and professional organizations across the public and private sectors; as well as policy makers and government representatives. This multi-disciplinary group advances the current state of education on trustworthy computing and a final project report summarizes the key discussions of the summit and the action items resulting from those discussions for stakeholder groups to consider.
Intellectual Merit: The summit provides a forum to address three specific objectives: (1) to engage a multi-disciplinary group of cyber security stakeholders (educators, industry representatives, and professional certification and training organizations) in a comprehensive dialogue about the current state of education in secure software; (2) to use this dialogue as the basis of a collaborative effort to develop creative approaches that enhance the quality of trustworthy computing education; and (3) to outline the core elements of a comprehensive agenda for secure software education.
Broader Impacts: PIs assemble a diverse group of approximately 60 invited participants representing several cyber security stakeholders (educators, professional certification and training organizations, and industry representatives). The PIs produce a white paper based on the summit that is disseminated through publication in a journal such as IEEE Security and Privacy, distributed to appropriate professional associate special interest groups, and circulated with summit participants. The Virtual Community of Practice is designed to support continued dialogue among summit participants.
Cybersecurity poses some of the most serious economic and national security challenges of the 21st century. In order to meet these challenges, the software that controls critical systems and infrastructure must be reliable, robust, and satisfy the requirements that are placed upon it. To this end, all people involved in the development and deployment of these systems and infrastructure, from the policymakers who determine the requirements, to the businesspeople who provide financial support, to the architects, implementers, and operators of these systems, must understand the criticality of reliable, robust, and secure software. Therefore, students studying a variety of technical and non-technical disciplines must recognize the difference between software that is sufficiently robust and software that is not. To address this need, the National Science Foundation Directorates of Computer and Information Science and Engineering and Education and Human Resources jointly sponsored the 2010 Summit on Education in Secure Software (SESS). Organized by Dr. Diana Burley from the George Washington University and Dr. Matt Bishop from the University of California at Davis, the summit focused on ways to advance and improve the state of education in secure[1] software. SESS participants included members of academia, government, industry, professional organizations, and policy makers from both the public and private sectors with expertise in secure software. This diverse group examined the challenges of teaching the design, implementation, and testing of secure software for six constituent groups: computer science students, non-computer science students, community college students, K-12 students, computer science professionals, and non-computer science professionals. Summary of the Findings The findings are presented in the form of "roadmaps" that describe ways to improve the state of education for constituent groups in secure programming. The roadmaps explain what the members of the constituent group should know, various methods by which they might be educated, and what resources will be necessary to achieve that level of education. The roadmaps also identify challenges to meeting these goals—the "potholes". Each roadmap concludes with specific recommendations for meeting the articulated educational goals. Although presented as separate roadmaps, one for each constituent audience, the roadmaps should be considered as different views of a unified educational program that spans kindergarten through professional development, for audiences ranging from software developers to those who focus on management, policy and use to ordinary computer users. Thus, the educational goals in the roadmaps are the "core fundamental end points" to be reached through instruction guided by a curriculum for secure programming. Overall, SESS participants asserted that secure programming must be considered within the context of the system design and deployment process and highlighted 6 critical points: Understanding security, especially during design, requires a holistic approach; Understanding and being able to identify common and emerging attack vectors is a critical component of security; Well-tested principles and frameworks of software development can inhibit attacks; All frameworks have weaknesses and subtleties; Part of secure programming is using strategic approaches to overcome these weaknesses; and Users of tools that aid in secure programming must know how to use those tools, and understand their limitations. Summary of the Recommendations The ten recommendations below provide a starting point for stakeholders across constituent groups to begin to transform education in secure software. Increase the number of faculty who understand the importance of secure programming principles, and will require students to practice them. Provide faculty support for the inclusion of security content in existing courses through clinics, labs, and other curricular resources. Establish professional development opportunities for college faculty, non- computer science professionals, and K-12 educators to heighten their awareness and understanding of secure programming principles. Integrate computer security content into existing technical (e.g. programming) and non-technical (e.g. English) courses to reach students across a variety of disciplines. Require at least one computer security course for all college students: For CS students focus on technical topics such as how to apply the principles of secure design to a variety of applications. For non-CS students focus on raising awareness of basic ideas of computer security. Encourage partnerships and collaborative curriculum development that leverages industry and government needs, resources, and tools. Promote collaborative problem solving and solution sharing across organizational (e.g. corporate) boundaries. Use innovative teaching methods to strengthen the foundation of computer security knowledge across a variety of student constituencies. Develop metrics to assess progress toward meeting the educational goals specified in the roadmaps presented in this document. Highlight the role that computer security professionals should play in key business decision-making processes. Reference The SESS report is available at: www.cs.ucdavis.edu/research/tech-reports/2011/CSE-2011-15.pdf [1] Throughout this report, the term "secure" is used in the sense of "robust" as well as "satisfying specified and implicit security properties".