Concentration in Information Assurance

Degree Requirements

Information Assurance is the practice of managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. More simply, IA is concerned with thoroughly understanding threats to computer systems, such as viruses and computer criminals, and formulating and deploying solutions to protect cyberspace. Information Assurance encompasses work in operating systems internals, cryptography, penetration testing, reverse engineering, digital forensics, and social engineering.

Information Assurance @UNO

Information AssuranceUNO has the strongest Information Assurance program in the region and is designated as a National Center of Academic Excellence (CAE) in Information Assurance Education (CAE) and Research (CAE-R) by the National Security Agency (NSA) and the Department of Homeland Security (DHS)—the only university holding these designations in the State of Louisiana. Faculty and students in the IA program at UNO work together on cutting edge problems involving reverse engineering malicious software, developing better digital forensics tools to help investigators recover data and solve computer crimes more efficiently, and creating new strategies for battling computer viruses.

National Security AgencyResearch and instruction are carried out in two state-of-the-art facilities: The Greater New Orleans Center for Information Assurance (GNOCIA) and the Networking and Security Laboratory (NSSAL). These labs provide workstations with an extensive array of commercial and open source software, including IDA Pro, AccessData’s Forensic Toolkit, and zynamics BinDiff and BinNavi, to expose students to the same tools that IA professionals use in their day-to-day jobs. All of our IA classes contain extensive laboratory components…you will do IA, not just sit and listen to lectures.

Opportunities

Information assurance teamIA students attend a security meeting to share ideas, give presentations, and keep up to date on the latest news in computer security. B.S., M.S., and Ph.D. student's along with the entire IA faculty, attend these meetings weekly.

Information Assurance professionals are in great demand in a wide range of jobs in the private sector, law enforcement, and in government. Digital forensics experts are employed to recover and analyze digital evidence for civil litigation, in criminal cases, and to support homeland security. To perform digital investigations, they rely on advanced knowledge of forensic techniques, operating systems, filesystems, and networking.

Network security experts design secure networks and protect these networks from ever-evolving threats, using a variety of mechanisms, including firewalls, intrusion detection systems, and penetration testing.

Information Assurance TeamAn IA student analyzes a broken hard drive using the GNOCIA's clean room and PC-3000 hard drive analyzer.

Reverse engineers analyze malware to understand how it operates, how to recover from its effects, and how to construct defenses to prevent future infection. They rely on extensive knowledge of operating systems internals, assembler, and static and dynamic analysis tools for reverse engineering.

Software engineers with a foundation in IA design and implement secure software using techniques that increase the resilience and reliability of both operating systems and application software. This requires deep understanding of programming languages as well as IA.

Objectives of Information Assurance Concentration

  • Prepare students for the job market by providing a solid foundation in all aspects of Information Assurance.
  • Give students practical experience with industry standard tools, frameworks, and investigation processes.

Highlights of Information Assurance Concentration

Reverse Engineering: Learn to analyze malware binaries, determine what a given malware does, and how it does it. Develop an understanding of operating system internals and how they are exploited by malware. Learn how modern malware obfuscates its presence and activities. Analyze malware ranging from simple examples that targeted MS-DOS through to modern examples that targeted Microsoft SQL Server and Windows.

Operating Systems Internals: Learn how operating systems are designed and implemented by examining code from modern Windows, Linux, and Mac OS X systems. Learn how trade-offs between security and performance affect the design choices of operating system programmers. Develop the skills to recognize flawed design choices and careless programming errors that can be exploited by an attacker to gain control of a system, and learn how those problems can be remedied.

Digital Forensics: Introduce the theory and application of computer forensics, an important area of computer security concerned with the preservation and recovery of digital evidence. Topics include: types of digital evidence, obfuscation methods used to hide digital evidence, such as steganography and encryption, tools for data preservation and recovery, techniques for ensuring data security, and legal issues in the preservation, recovery, and presentation of digital evidence.

Network Security: Practice the development and application of tools and techniques for securing computer networks. Topics include: basic issues in network security, network intrusion detection, honeypots and honeynets, network forensics analysis, physical security models, authentication and access control mechanisms, application and operating system level security, malicious software, and encryption; including private- and public-key encryption methods.