University fills new network security position
June 5, 2002
Today’s fast-paced society is increasingly using the Internet as a communication medium because of its speed and convenience.
Services once offered only through the physical transfer of a product to the consumer, such as banking, shopping and investing, are now being accomplished between computers in cyberspace.
Many times, this requires the transfer of personal, sensitive data. Safeguards must be in place to protect that information as it relays from the customers’ home computers to businesses and their networks as well as to protect the federal government.
Undergraduate students in six different majors are learning how to ensure that the systems and the transfer of data between them are safe.
Computer science, electrical and computer engineering, industrial and manufacturing systems engineering, logistics, operations and management information systems, mathematics and political science students can take three or more graduate courses to specialize in this area.
“More students are indicating a preference in security as an undergraduate,” said Doug Jacobson, associate professor of electrical and computer engineering.
Jacobson is one of 25 faculty members that collaborate on computer security issues including intrusion detection, security of wireless networks and secure e-commerce.
“We plan on adding a few computer security people to the department each year,” Jacobson said.
Tom Daniels, graduate research assistant in computer engineering at Purdue University, was just hired in the electrical and computer engineering department and will specialize in computer security. Daniels will start in the fall.
“I chose Iowa State because of the Information Systems Security Laboratory and the Cybercorp program and [NSF-funded scholarships], that ensure a supply of students specializing in the area of computer security,” Daniels said. “I personally chose Iowa State because it’s near where I grew up.”
Jacobson said it took about six months to fill the position that about 15 people applied for.
He said that none of the applicants except Daniels had formal training in computer security from a reputable school.
The shortage of trained faculty and students in information assurance and computer security has reached a “critical level,” said Larry Hanneman, adjunct associate professor in engineering career services.
“The demand for these students by employers will far outreach the supply for over at least the next five to ten years,” Hanneman said. “That demand will certainly be driven by government, national security and defense concerns.”
Hanneman said the Armed Forces have ranked in the top five employers hiring engineering graduates over the past few years.
In order to increase the number of computer security personnel working in government, the National Science Foundation has offered scholarships to students in exchange for a commitment of up to two years at a federal agency. In addition, the foundation provides funding to schools for facilities, faculty training and research in computer security.
Iowa State is one of six higher education institutions chosen to participate in this program.
While some of these students will be working within government agencies many will work in the private sector.
“Students in information assurance and computer security can work with companies that produce security, a company where security is a critical aspect, like IBM, or a company where security is not the focus but is essential for business. This would be true for insurance companies and auditing firms,” Jacobson said.
Computer security isn’t a concern for just businesses and government. Users of personal computers should take precautions as well.
“Iowa State is constantly being probed for vulnerabilities,” Jacobson said. “The best thing to do is run a personal firewall.”
Firewall programs like BlackICE PC Protection and ZoneAlarm Pro 2.0 sell for about $39.99 at most retail outlets. McAfee Firewall 3.0 is priced at about $29.99 and Norton Personal Firewall 2002 sells for about $49.99.
Jacobson also suggests using an anti-virus program, being cautious when downloading disks or opening e-mail attachments and using secure sites to “protect yourself against a cyber attack.”
Mike Gavin, West Des Moines branch sales manager for the Gateway Country Store, said computer security programs are a “necessary evil.”
“Most customers don’t request security software because they aren’t aware there is such a thing,” Gavin said. “A firewall simply protects your information if someone is invading your computer and it gives you a message that someone was just trying to get in. Anyone who owns a firewall program knows that these attempts are very common.”
Accessing a computer system without the owner’s consent is a federal crime, violating the U.S. Code Title 18, Section 1030.
Using another person’s identification information for any profit in excess of $1,000 is a class D felony.
States have different laws concerning unauthorized access into computer systems.