SPECIAL REPORT OF THE GRADUATE AND PROGRAM AND BUDGET COUNCILS

Similar documents
SPECIAL REPORT INTERNATIONAL STUDIES COUNCIL

February 5, 2015 THE BEACON Volume XXXV Number 5

GOVERNOR S COUNCIL ON DISABILITIES AND SPECIAL EDUCATION. Education Committee MINUTES

Oak Park and River Forest High School District 200 Board of Education May 22, 2014 Personnel Report

MINUTES. Kentucky Community and Technical College System Board of Regents. Workshop September 15, 2016

NC Education Oversight Committee Meeting

ST. MARTIN PARISH SCHOOL BOARD MAY 7, 2014 BREAUX BRIDGE, LOUISIANA MINUTES

Valdosta State University Master of Library and Information Science MLIS 7130 Humanities Information Services Syllabus Fall 2011 Three Credit Hours

Entry Plan for the First 100 Days for Tari N. Thomas. Interim Superintendent of Schools Orange, Petersham and RC Mahar Regional

SUMMARY REPORT MONROE COUNTY, OH OFFICIAL RESULTS PRIMARY ELECTION MARCH 6, 2012 RUN DATE:03/20/12 11:03 AM STATISTICS REPORT-EL45 PAGE 001

AAC/BOT Page 1 of 9

MINUTES SPECIAL WORKSHOP BOARD OF TRUSTEE MEETING FEBRUARY 9, :30 A.M. STUDENT UNION BUILDING

We are strong in research and particularly noted in software engineering, information security and privacy, and humane gaming.

M I N U T E S ANNUAL GENERAL MEETING Wednesday 18 March 2015

AGENDA Symposium on the Recruitment and Retention of Diverse Populations

CCC Online Education Initiative and Canvas. November 3, 2015

CCPS STEERING COMMITTEE MEETING MINUTES JUNE 15, 2011 NATIONAL UNIVERSITY

Committee on Academic Policy and Issues (CAPI) Marquette University. Annual Report, Academic Year

Department of Education School of Education & Human Services Master of Education Policy Manual

Course Development Using OCW Resources: Applying the Inverted Classroom Model in an Electrical Engineering Course

TK20 FOR STUDENT TEACHERS CONTENTS

Ruggiero, V. R. (2015). The art of thinking: A guide to critical and creative thought (11th ed.). New York, NY: Longman.

CALL TO ORDER. Mr. Phil Bova, President Mr. Craig Olson, Vice President Mr. Lee Frey Mrs. Nancy Lacich Mr. Barry Tancer SPECIAL RECOGNITION

Ministry Audit Form 2016

By Hasco: I move that the Board approve the agenda as presented. Seconded by Bolas, and carried on unanimous voice vote.

Bibliography. Allen, Daniel. "Volunteering Works." Mental Health Practice 11.9 (2008): 6-7. Academic

College Pricing. Ben Johnson. April 30, Abstract. Colleges in the United States price discriminate based on student characteristics

Monday/Wednesday, 9:00 AM 10:30 AM

President's Perspective. 1st Avenue. Second Annual Charlestown Community Day September 20. Provost Blog. Institute Expands Space for Research, Offices

Application for Fellowship Leave

IMPROVING THE QUALITY OF LIFE FOR GRADUATE STUDENTS AT UNC

HIGHLAND HIGH SCHOOL CREDIT FLEXIBILITY PLAN

Linguistics. The School of Humanities

St. Mary Cathedral Parish & School

For Your Future. For Our Future. ULS Strategic Framework

Honors Interdisciplinary Seminar

Save Children. Can Math Recovery. before They Fail?

MINUTES VILLAGE OF LA GRANGE BOARD OF TRUSTEES REGULAR MEETING. Town Meeting Spring Avenue School (Gymnasium) 1001 Spring Avenue La Grange, IL 60525

University of Massachusetts Amherst

I. Objectives. A. Degree offered: M.S. B. Discipline: Materials Science and Engineering (MSE)

A Framework for Safe and Successful Schools

Nine Steps to Building a New Toastmasters Club

CONTINUUM OF SPECIAL EDUCATION SERVICES FOR SCHOOL AGE STUDENTS

Public Comments (2 minute limit per person) AS Executive Board Reports (15 minutes)

UNIVERSITY OF MASSACHUSETTS MINUTES OF THE MEETING OF THE ADVANCEMENT COMMITTEE

AGENDA ITEM VI-E October 2005 Page 1 CHAPTER 13. FINANCIAL PLANNING

UNCF ICB Enrollment Management Institute Session Descriptions

Special Enrollment Petition (SEP): In-Absentia Enrollment

Differential Tuition Budget Proposal FY

DRAFT VERSION 2, 02/24/12

Faculty Voice Task Force 5: Fixed Term Faculty. November 1, 2006

Seattle-King County Veterinary Medical Association September Vet-Rap Newsletter 2011

Annual Report Accredited Member

Economics. Nijmegen School of Management, Radboud University Nijmegen

The University of Akron NACADA Audit 2009

East Riding of Yorkshire SACRE Report 2012/13

UNIVERSITY OF BALTIMORE

DYNAMIC ADAPTIVE HYPERMEDIA SYSTEMS FOR E-LEARNING

Chapter 9 The Beginning Teacher Support Program

PROGRAMME SPECIFICATION KEY FACTS

Virginia Higher Education Update

Field Experience Management 2011 Training Guides

Qs&As Providing Financial Aid to Former Everest College Students March 11, 2015

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

DU PAGE COUNTY JUDICIAL AND PUBLIC SAFETY COMMITTEE FINAL SUMMARY. November 17, 2015 Regular Meeting 8:15 AM

Guru: A Computer Tutor that Models Expert Human Tutors

THE DAYTON ENGINEER SEPTEMBER DSPE MONTHLY CHAPTER MEETING VENUE CHANGE! OCTOBER DSPE MONTHLY CHAPTER MEETING

IMPORTANT INFORMATION FOR POSTGRADUATE STUDENTS

MINUTES OF THE GOVERNING BOARD OF SIR WILLIAM RAMSAY SCHOOL HELD AT THE SCHOOL ON WEDNESDAY 23 FEBRUARY 2017 AT 7.00 P.M.

10-Year Priority List

Application for Admission

WEEKLY CHARGER. Principal s Schedule. Powerschool is an OHS teacher s main source of communication

1 3-5 = Subtraction - a binary operation

Helping Graduate Students Join an Online Learning Community

ATHLETIC ENDOWMENT FUND MOUNTAINEER ATHLETIC CLUB

Center for Higher Education

Activity Insight Faculty User Guide

PROFESSIONAL DEVELOPMENT/FLEX COMMITTEE AGENDA. Thursday 9/29/16 Room - R112 2:30pm 4:00pm

(1) The History, Structure & Function of Urban Settlements; (2) The Relationship Between the Market and the Polis in Economics, Policy and Planning;

Guide to the Records of the Massachusetts Institute of Technology Art Committee AC.0066

DEPARTMENT OF EARLY CHILDHOOD, SPECIAL EDUCATION, and REHABILITATION COUNSELING. DOCTORAL PROGRAM Ph.D.

SINGLE PLAN FOR STUDENT ACHIEVEMENT. Peter Johansen High School

CHANCERY SMS 5.0 STUDENT SCHEDULING

John Jay College of Criminal Justice, CUNY ASSESSMENT REPORT: SPRING Undergraduate Public Administration Major

A PROCEDURAL GUIDE FOR MASTER OF SCIENCE STUDENTS DEPARTMENT OF HUMAN DEVELOPMENT AND FAMILY STUDIES AUBURN UNIVERSITY

UC Santa Cruz Graduate Research Symposium 2016

ADDENDUM 2016 Template - Turnaround Option Plan (TOP) - Phases 1 and 2 St. Lucie Public Schools

Implementing a tool to Support KAOS-Beta Process Model Using EPF

July 8-10, 2015 Baruch College - City University of New York

Table of Contents Welcome to the Federal Work Study (FWS)/Community Service/America Reads program.

Cerritos Community College District Organizational Chart

KUTZTOWN UNIVERSITY KUTZTOWN, PENNSYLVANIA COE COURSE SYLLABUS TEMPLATE

Our installer John Stoddard was polite, courteous, and efficient. The order was exactly as we had placed it and we are very satisfied.

CHAPTER XXIV JAMES MADISON MEMORIAL FELLOWSHIP FOUNDATION

A Game-based Assessment of Children s Choices to Seek Feedback and to Revise

Top Ten Persuasive Strategies Used on the Web - Cathy SooHoo, 5/17/01

Kansas Adequate Yearly Progress (AYP) Revised Guidance

Guide for primary schools

College Action Project Worksheet for CAP Projects March 18, 2016 Update

Developing an Assessment Plan to Learn About Student Learning

Transcription:

SPECIAL REPORT OF THE GRADUATE AND PROGRAM AND BUDGET COUNCILS concerning a COMPUTER SCIENCE MASTER S CONCENTRATION IN SECURITY WITHIN THE COLLEGE OF INFORMATION AND COMPUTER SCIENCES (CICS) Presented at the 768 th Regular Meeting of the Faculty Senate April 27, 2017 COUNCIL MEMBERSHIP GRADUATE COUNCIL Neal Abraham, Sonia Alvarez, Maria Barbon, Lori Baronas, Joseph Black, Paulina Borrego, D. Anthony Butterfield, Leslie Button, Canan Cevik, Hayley Cotter, Catherine Dimmitt, Steve Goodwin, Mark Hamin, Neil Immerman, Cynthia Jacelon, A Yęmisi Jimoh, Arthur Kinney, David Kotz, John Lopes (Chair), Michael Malone, John McCarthy, Daniel Morales, David Morin, Angela Niazmand, MJ Peterson, Sarah Poissant, Frederic Schaffer, Patrick Sullivan, Nathan Therien, David Vaillancourt, Tilman Wolf, Kristine Yu PROGRAM AND BUDGET COUNCIL William Richards Adrion, Joseph Bartolomeo, William Brown, D. Anthony Butterfield, Elizabeth Chang, Nancy Cohen, Patricia Galvis y Assmus, Bryan Harvey, Eddie Hull, Moira Inghilleri, Michael Leto, Lisa Liebowitz, Talia London, Andrew Mangels, Ernest May, John McCarthy, Lynn McKenna, Esther Oh, Anthony Paik, MJ Peterson, Alex Phillips, Margaret Riley, Stephen Schreiber, Anurag Sharma (Chair), Jessica Williams, Donna Zucker

GRADUATE COUNCIL The Academic Standards and Curriculum Committee (ASCC) of the Graduate Council met on February 1, 2017 and reviewed the proposal for the Computer Science Master s Concentration in Security within the College of Information and Computer Sciences (CICS). The ASCC recommended this proposal for approval. On Wednesday, February 8, 2017, the Graduate Council unanimously approved the Computer Science Master s Concentration in Security within the College of Information and Computer Sciences (CICS), Proposal #3365 in the Course and Curriculum Management System. PROGRAM AND BUDGET COUNCIL This proposal creates a new Computer Science Master s Concentration within the College of Information and Computer Sciences (CICS). It does not overlap the Certificate currently in place. The proposed concentration allows CICS to respond more effectively to the demand for students with training in security, privacy and related topics. It also takes advantage of the recently established Cybersecurity Institute. There are no new resources required as it relies on currently-taught or scheduled courses and admission controls will be put in place to ensure ability to accommodate new students will not be exceeded. At its meeting on March 22, 2017, the Program and Budget Council unanimously approved the Computer Science Master s Concentration in Security within the College of Information and Computer Sciences (CICS). It was submitted as Proposal #3365 in the Course and Curriculum Management System. MOTION: That the Faculty Senate approve the Computer Science Master s Concentration in 26-17 Security within the College of Information and Computer Sciences (CICS), as presented in.

Briefly describe the Proposal This proposal will create a new Computer Science Master's concentration in Security within the College of Information and Computer Sciences (CICS). Expanding opportunities for security education and training is increasingly important to students that wish to pursue jobs in any industry or government position. The proposed concentration in security will allow CICS to respond more effectively to the demand for students with training in security, privacy, and related topics, while leveraging existing CICS resources, and resources committed to the recently established Cybersecurity Institute. Students completing the concentration will satisfy the requirements of our existing Master's program through a mixture of new courses tailored specifically to security, as well as existing computer science courses. Provide a brief overview of the process for developing the proposal. This proposal was developed both to respond to a clear need for enhanced training in the area of security, and to take advantage of the opportunity provided by the recent establishment of the Cybersecurity Institute. To develop the curriculum for the proposed concentration, a review of the offerings at top universities with existing security concentrations and degree programs was conducted, with a particular focus on the Master of Science in Security program. A review of existing security-related courses offered at UMass Amherst was then conducted, and faculty from CICS and the College of Engineering were contacted for input. Based on these reviews, a group of faculty was consulted, including Profs. James Allan (Chair of the Faculty), Andrew McGregor (Curriculum Chair), Mark Corner (MS program director), Prof. Brian Levine (Cybersecurity Institute director), as well as Leeanne Leclerc (Graduate Program Manager) and faculty teaching security courses (Amir Houmansadr, Phillipa Gill, Marc Liberatore, and Gerome Miklau). This group contributed to creating the proposed curriculum for the concentration based on a combination of existing and newly-approved courses. The proposed concentration was then presented to the CICS faculty, who voted to approve the proposal. Describe the proposal's purpose and the particular knowledge and skills to be acquired. As noted above, the need to provide expanded and enhanced training in the area of security has been widely recognized. The goal of this proposal is to help meet this need by creating a new concentration that will provide students with a masters-level computer science curriculum focused specifically on security. This proposal has also driven the creation of several new courses that have expanded our curricular offerings to cover more facets of security. This proposal is intended to be similar to our existing Master s program and the recently approved Computer Science Master s concentration in Data Science, so that students have some flexibility to switch between all three plans. Students in the security concentration will be required to take four core courses (12 credits), including one each from the Systems, Theory, and AI areas. One of the four must be COMPSCI 660 Advanced Information Assurance, which is a systems core. Courses from COMPSCI in a set Security menu may count as a second systems core for this concentration only. A grade of B or better is required in each course. Students must take four additional courses as free electives (12 credits). Students must take two additional courses as security electives (6 credits) from the same set Security menu. Unlike requirement (a), the two may be offered outside COMPSCI. A grade of B or better must be achieved in these two security electives.

The concentration includes an optional 6-credit project to count towards the electives requirement. A project will provide students with practical hands-on experience in one or more areas of security (privacy, forensics, network security, etc.). The project will also give students a chance to enhance their project management, and oral and written communication skills. The project counts towards the electives requirement, as do any independent studies. Satisfying all four electives with two independent studies and then a 6-credit project is strongly discouraged. If this proposal requires no additional resources, say so and briefly explain why. If this proposal requires additional resources, explain how they will be paid for. For proposals involving instruction, indicate how many new enrollments are expected and whether the courses have room to accommodate them. This concentration leverages existing faculty in CICS and courses that are already being taught in Fall 2016 or scheduled for Spring 2017, with plans for continued offerings in subsequent academic years. (For example, this academic year, COMPSCI 590B/690B: Detecting Interference in Networks, COMPSCI 590F Digital Forensics, and COMPSCI 591L Computer Crime Law have been introduced to our curriculum.) The courses that are critical to sustaining the Concentration in Security are being taught by existing CICS faculty members and will be part of their regular teaching duties. We expect the creation of this concentration to increase applications to our master's program, but admission controls will be used to ensure that we will not exceed our ability to accommodate these students in new and existing courses. In addition, the new security courses that we will create will be capped to provide sufficient seats for all admitted students. We again expect the cost of any additional teaching assistants required for these courses to be covered by available tuition from the additional students. Finally, since students in the concentration will be able to use a few other graduate-level computer science courses and courses from other departments as electives, we do not expect undue pressure on other existing courses. Provide a curriculum outline showing degree program requirements, requirements of any existing concentrations, requirements of proposed concentration, and how they relate. You may include this outline and any additional documents as attachments below. See the table in the attached document for a comparison of requirements between the primary Computer Science MS degree, the proposed concentration in Security, and the existing concentration in Data Science. The document includes a sample schedule as well.

Existing Computer Science Master s Requirements 1. Total 30 course credits 2. Students must take four Computer Science core courses (12 credits) including one each from the areas of Theory, Systems and Artificial Intelligence, and one additional course from any area. A grade of B or better must be achieved in all cores. 3. Students must take six additional courses as electives (18 credits). Security Master s Concentration Requirements 2. Students must take four core courses (12 credits), including one each from the Systems, Theory, and AI areas. COMPSCI 660 must be taken as a systems core. Courses from COMPSCI in the Security menu may count as a second Systems core for this concentration only. A grade of B or better must be achieved in all four cores. 3a. Students must take four additional courses as free electives (12 credits); 3b. And students must take two additional courses (6 credits) as security electives from a Security menu. Unlike Item 2, they may be offered outside CICS. A grade of B or better must be achieved in these Existing Data Science Concentration 2. Students must take four core courses (12 credits) including one each from the areas of Theory for Data Science, Systems for Data Science, and Data Analysis, and one additional core course from any area. A grade of B or better must be achieved in all Data Science cores. 3a. Two courses (6 credits) taken from among a set of courses designated as satisfying the Data Science Elective requirement; 3b. And one course (3 credits) taken from among a set of courses satisfying the Data Science Statistics requirement; 3c. And three additional courses as free electives (9 credits). two security electives. 4. No more than 9 credits total may come from courses outside of CICS. Credit for graduate courses from other departments and colleges must be approved by the GPD. 5. No more than 18 credits may come from courses at the 500 level. 500-level classes taken to satisfy menu requirements fall into this group. 6. At least 12 of those 18 credits must come from courses at the 600-900 level that are not independent studies. 600-level classes taken to satisfy menu requirements fall into this group. 7. No more than 6 credits may be taken pass/fail. 8. At most 12 credits from independent studies and/or a Master s project (COMPSCI 701). 9. Classes with a grade below a C may not be counted toward the MS degree. 10. No more than 12 credits may be transferred from other programs or institutions. 11. Overall grade point average for 30 MS credits must be 3.0 or higher.

Sample Schedule Fall I COMPSCI 590B; COMPSCI 590D Spring I COMPSCI 660; 600-level elective; 500/600-level elective Fall II COMPSCI 591L, COMPSCI 589, 600-level elective Spring II COMPSCI 591S, 500/600-level elective (Or instead COMPSCI 701 MS project for 6 credits) First systems core (via security menu); Theory core Second systems core; First elective Second elective First security elective AI core Third elective Second security elective Fourth elective