Programma Svolto. Inglese. 5Bi. prof.ssa Fiorenza Congedo

Size: px
Start display at page:

Download "Programma Svolto. Inglese. 5Bi. prof.ssa Fiorenza Congedo"

Transcription

1 ! I STITUTO T ECNICO I NDUSTRIALE S TATALE Guglielmo Marconi Verona Programma Svolto Inglese 5Bi prof.ssa Fiorenza Congedo Anno Scolastico 2014/15 Materia Inglese Classe 5Bi Docente Fiorenza Congedo Materiali didattici Blog di classe: Nome documento ING5BIs

2 Modulo 1: The history of computers Unità didattica 1: Top 10 most important people in the history of computers Tim Berners-Lee Bill Gates Gordon Moore Philip Don Estridge Steve Jobs Douglas Engelbart John von Neumann Tommy Flowers Charles Babbage Alan Turing e visione del film The Imitation Game in lingua originale Modulo 2: Computer Languages Unità didattica 2: Programs and Programming The top 10 most popular programming languages: Java, C, C ++, PHP, Visual Basic, Python, C#, JavaScript, Perl and Ruby Unità didattica 3: Websites Designing a website Steps for a precise web design process: website layout, website style, website text, files and folders, images, links and testing Describe a web site that you have visited/that you often visit

3 Modulo 3: The Internet Unità didattica 4: The Internet: history & definition The history of the Internet Internet Quiz Timeline How did the Internet start? Early Networks The key moments in the development of the Internet Tim Berners Lee: biography The World Wide Web Unità didattica 5: The Internet of Things The Internet of Things What is the Internet of Things? What Does This Term Really Mean? Internet of Things: some examples of the Internet of Things in action The Web and the Internet of Things - both disruptive technologies The possible benefits of the Internet of Things How the Web and the Internet of Things will continue to improve global communication

4 Modulo 4: Security and Privacy of the Internet Unità didattica 6: Network Security Obiettivi specifici To understand the basic ideas related to security and privacy on the Internet To discuss controversial issues related to the Internet Network Security Anti-virus software Firewalls Secure passwords Access levels Encryption Network policies Acceptable Use Policy (AUP) Archiving Network security failures Cyber attacks Hacking 5 biometric alternatives to the password: heartbeat, ear shape, walk, typing speed and face recognition Unità didattica 7: Internet Security and Cybercrime Fight against cybercrime in Europe, EU Commission (video) James Lyne: Everyday cybercrime and what you can do about it (video) Unità didattica 8: We are living 1984 today We re living 1984 today George Orwell: biography 1984 by George Orwell: Video SparkNotes, Orwell's 1984 Summary

5 Unità didattica 9: Introduction to Cryptography Obiettivi specifici What is Cryptography? Modern cryptography The origin of cryptography Introduction to Cryptography and Caesar Cipher (video) Encryption The Enigma Machine Modulo 5: Networks and Databases Unità didattica 10: Network Topologies Networks Data packets Protocols Advantages and disadvantages Types of Network LAN Local Area Network WAN Wide Area network VPN Virtual Private Network WPAN Wireless Personal Area Network PAN - Personal Area Network Networking Basics Key Features Unità didattica 11: Databases What is a Database? (video) More about Databases (video) Even more about databases (video)

6 Unità didattica 12: Definition of a Database and a DBMS Definition of a Database Types of Database Rule 1: Information Rule Rule 2: Guaranteed Access Rule Rule 3: Systematic Treatment of Null Values Rule 5: Comprehensive Data Sublanguage Rule Rule 7. High-level Insert, Update, and Delete DBMS - Database Management Systems RDBMS Relational Database Management Systems Normalisation La docente prof.ssa Fiorenza Congedo

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University

By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University History of Web History of the Internet Basic Web System Architecture URL DNS Creating Static and Dynamic Information Security

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

LICEO SCIENTIFICO L. da VINCI Reggio Calabria A/S 2014/2015 PROGRAMMA SVOLTO DI LINGUA E CULTURA INGLESE CLASSE 2 G

LICEO SCIENTIFICO L. da VINCI Reggio Calabria A/S 2014/2015 PROGRAMMA SVOLTO DI LINGUA E CULTURA INGLESE CLASSE 2 G LICEO SCIENTIFICO L. da VINCI Reggio Calabria A/S 2014/2015 PROGRAMMA SVOLTO DI LINGUA E CULTURA INGLESE CLASSE 2 G Libro in adozione: Success 2 Pearson-Longman 1 A new culture Asking and answering questions

More information

CISC 310 ONLINE Spring 2016. Review for Final Exam

CISC 310 ONLINE Spring 2016. Review for Final Exam CISC 310 ONLINE Spring 2016 Review for Final Exam The following is a study guide to help you prepare for the exam. The exam will include but not be limited to the information on this review sheet. The

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

126.47. Web Design (One Credit), Beginning with School Year 2012-2013.

126.47. Web Design (One Credit), Beginning with School Year 2012-2013. 126.47. Web Design (One Credit), Beginning with School Year 2012-2013. (a) General requirements. Students shall be awarded one credit for successful completion of this course. This course is recommended

More information

Assessment of Learning Report Computer Science CPT Fall 2008 Spring 2010. I. Introduction and Background

Assessment of Learning Report Computer Science CPT Fall 2008 Spring 2010. I. Introduction and Background Assessment of Learning Report Computer Science CPT Fall 2008 Spring 2010 AAS DEGREE: Computer Programming AAS DEGREE: Database Management AAS DEGREE: Telecommunications I. Introduction and Background Mission

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to: Network Security Chapter 12 Learning Objectives After reading this chapter, you should be able to: Recognize the basic forms of system attacks Recognize the concepts underlying physical protection measures

More information

PROGRAMMA SVOLTO LICEO GINNASIO JACOPO STELLINI ANNO SCOLASTICO 2015/2016. La Docente Silvana Foti PROF.SSA SILVANA FOTI

PROGRAMMA SVOLTO LICEO GINNASIO JACOPO STELLINI ANNO SCOLASTICO 2015/2016. La Docente Silvana Foti PROF.SSA SILVANA FOTI LICEO GINNASIO JACOPO STELLINI Piazza I Maggio, 26-33100 Udine Tel. 0432 504577 Fax. 0432 511490 Codice fiscale 80023240304 e-mail: info@liceostellini.it - Indirizzo Internet: www.stelliniudine.gov.it

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. 2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

COMPUTER NETWORK SECURITY QUESTION BANK UNIT-I DATA COMMUNICATION

COMPUTER NETWORK SECURITY QUESTION BANK UNIT-I DATA COMMUNICATION COMPUTER NETWORK SECURITY QUESTION BANK UNIT-I DATA COMMUNICATION 1. Define protocol. 2. Define transmission medium. 3. What are the basic components of data communication? 4. What is dataflow? 5. List

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

Protecting Critical Infrastructure. Secure Fashion. Kevin McPoland GarrettCom

Protecting Critical Infrastructure. Secure Fashion. Kevin McPoland GarrettCom Protecting Critical Infrastructure Leveraging Ethernet in a Secure Fashion Kevin McPoland GarrettCom Environment Today Multiple networks/ owners Operations Legacy serial, SCADA, building automation Physical

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information

More information

Scene of the Cybercrime Second Edition. Michael Cross

Scene of the Cybercrime Second Edition. Michael Cross Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying

More information

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY

More information

Taxonomy of E-Mail Security Protocol

Taxonomy of E-Mail Security Protocol Taxonomy of E-Mail Security Protocol Ankur Dumka, Ravi Tomar, J.C.Patni, Abhineet Anand Assistant Professor, Centre for information Technology, University of Petroleum and Energy Studies,Dehradun, India

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

INFORMATION TECHNOLOGY GRADES 10-12

INFORMATION TECHNOLOGY GRADES 10-12 GRADE 12 Grade 12: Term 1-10 weeks/40 hours Data and Information Management: Database design and concepts (±1 week/4 hours) - Relational database overview o Normalisation (overview and purpose) to reduce

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

What is a programming language?

What is a programming language? Overview Introduction Motivation Why study programming languages? Some key concepts What is a programming language? Artificial language" Computers" Programs" Syntax" Semantics" What is a programming language?...there

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science

More information

ECDL / ICDL IT Security Syllabus Version 1.0

ECDL / ICDL IT Security Syllabus Version 1.0 ECDL / ICDL IT Security Syllabus Version 1.0 Purpose This document details the syllabus for ECDL / ICDL IT Security. The syllabus describes, through learning outcomes, the knowledge and skills that a candidate

More information

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

(World Wide) Web WWW. Web History

(World Wide) Web WWW. Web History (World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL

More information

21st Century Cyber Security Challenges

21st Century Cyber Security Challenges 21st Century Cyber Security Challenges A Perspective From Large-Scale Global Enterprise M. Huang The Boeing Company BOEING is a trademark of Boeing Management Company. Huang, FORWARD, 2008 Real-life

More information

CISA TIMETABLE (4 DAYS)

CISA TIMETABLE (4 DAYS) CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology

More information

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4 Increasing Network Security Introduction Network and data security has been a growing concern in many organizations. With the emergence of wireless networking, security preemptives have been primarily

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

Catalog Month 20XX Living Space Smart Home. Guide Sublinefor network security in building systems control

Catalog Month 20XX Living Space Smart Home. Guide Sublinefor network security in building systems control Catalog Month 20XX Living Space Smart Home Smart Headline Home. Guide Sublinefor network security in building systems control Smart Home. The entire house under control. Totally practical for everyday

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

IT3504: Web Development Techniques (Optional)

IT3504: Web Development Techniques (Optional) INTRODUCTION : Web Development Techniques (Optional) This is one of the three optional courses designed for Semester 3 of the Bachelor of Information Technology Degree program. This course on web development

More information

Higher Computing. Computer Networks. Homework Sheets

Higher Computing. Computer Networks. Homework Sheets Higher Computing Computer Networks Homework Sheets Page 1 Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function

More information

A software solution is needed for secure communication between you and a friend. Requirements

A software solution is needed for secure communication between you and a friend. Requirements CS Principles Encryption Project Plan Last updated: 02/10/2014 Software Engineer(s): Ada Lovelace & Alan Turing Problem A software solution is needed for secure communication between you and a friend.

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

WEB DEVELOPMENT IA & IB (893 & 894)

WEB DEVELOPMENT IA & IB (893 & 894) DESCRIPTION Web Development is a course designed to guide students in a project-based environment in the development of up-to-date concepts and skills that are used in the development of today s websites.

More information

Alan Turing, the Imitation Game and Big Data

Alan Turing, the Imitation Game and Big Data Alan Turing, the Imitation Game and Big Data Frank Thuijsman March 1, 2016 Alan Turing June 23 12, born London 31-34 King s College (S) 35-36 King s College (F) 36 computable numbers 38 PhD, Princeton

More information

Tutorial 3. June 8, 2015

Tutorial 3. June 8, 2015 Tutorial 3 June 8, 2015 I. Basic Notions 1. Multiple-choice (Review Questions Chapter 6, 8 and 11) 2. Answers by a small paragraph (Chapter 2: viruses: MBR, rootkits, ) Multiple choice X. Which is the

More information

INFORMATION SECURITY TRAINING CATALOG (2016)

INFORMATION SECURITY TRAINING CATALOG (2016) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2016) Revision 4.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

capabilities statement

capabilities statement capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional

More information

2016 TÜBİTAK BİLGEM Cyber Security Institute

2016 TÜBİTAK BİLGEM Cyber Security Institute 2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack

More information

CTI Higher Certificate in Information Systems (Engineering)

CTI Higher Certificate in Information Systems (Engineering) CTI Higher Certificate in Information Systems (Engineering) Module Descriptions 2015 CTI is part of Pearson, the world s leading learning company. Pearson is the corporate owner, not a registered provider

More information

Information and Network Security

Information and Network Security Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173 Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS TECHNOLOGY PROGRAMS PROGRAM PAGE A+... 4 CISCO NETWORKING ACADEMY... 2 CITRIX IT ACADEMY... 3 COMPUTER AIDED DRAFTING... 8 COMPUTERIZED ACCOUNTING... 6 COMPUTERS... 5 CYBER SECURITY... 3 MICROSOFT ADMINISTRATION...

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s

More information

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 2 Introduction My research project included: Talking

More information

RoadSync. Administrator s Guide. www.dataviz.com/roadsync. Mobilizing Microsoft Office Life for Businesses & Professionals Around the World

RoadSync. Administrator s Guide. www.dataviz.com/roadsync. Mobilizing Microsoft Office Life for Businesses & Professionals Around the World Access Corporate Outlook E-mail & Data on the World s Most Popular Smartphones via Secure, Wireless & Direct Synchronization with Microsoft Exchange 2003 RoadSync Administrator s Guide Mobilizing Microsoft

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Remote Access for LAPD Users Using Aventail SSL VPN

Remote Access for LAPD Users Using Aventail SSL VPN Remote Access for LAPD Users Using Aventail SSL VPN About Aventail SSL VPN This document describes how to access the LAPD network remotely, using a technology called SSL (Secure Socket Layer) VPN (Virtual

More information

Issues in Information Systems Volume 15, Issue I, pp. 81-87, 2014

Issues in Information Systems Volume 15, Issue I, pp. 81-87, 2014 SECURITY REQUIREMENTS IN SOCIAL NETWORKS Mehdi Sagheb-Tehrani (PhD), Columbus State University, tehrani_mehdi@columbusstate.edu Arbi Ghazarian (PhD), Arizona State University, Arbi.Ghazarian@asu.edu ABSTRACT

More information

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri Taoufik.Nouri@FHNW.CH. sd&m 16.09.

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri Taoufik.Nouri@FHNW.CH. sd&m 16.09. Künftige Cyber-Attacken: Risiken und Techniken Future Cyber attacks: Risks and techniques Prof. Dr. T. Nouri Taoufik.Nouri@FHNW.CH sd&m 16.09.08 Content 1. Hacking Techniques 2. Main Goals of IT-security

More information

Web Development: Techniques for Handling Content. Shelley Slaey June 2, 2014

Web Development: Techniques for Handling Content. Shelley Slaey June 2, 2014 Web Development: Techniques for Handling Content Shelley Slaey June 2, 2014 Web Background Author User (Client) Web Server (Server) Web Background Request Response Web Server Request Web Browser Response

More information

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

ethernet services for multi-site connectivity security, performance, ip transparency

ethernet services for multi-site connectivity security, performance, ip transparency ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Diploma in Information Security Control, Audit and Management (CISSP Certification)

Diploma in Information Security Control, Audit and Management (CISSP Certification) Diploma in Information Security Control, Audit and This course is designed and delivered by experienced information security professionals and is useful to information system managers, information security

More information

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is

More information

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP. 1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information

Security on Embedded Systems

Security on Embedded Systems Cyber Security (CYS) Issue Group Activity Report Security on Embedded Systems Chair : Buheita Fujiwara Information-technology Promotion Agency With Cybersecurity Malaysia, Hitachi and III GBDe Summit 2007,

More information

Cyber Security Certificate

Cyber Security Certificate Mount Wachusett Community College 1 Cyber Security Certificate Technical Standards for CSC Students entering these programs must be able to demonstrate the ability to: Comprehend textbook material at the

More information

Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200

Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200 Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200 Course Description: Advanced Cybersecurity is designed to provide students the advanced concepts and terminology of

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

Creating a VPN Using Windows 2003 Server and XP Professional

Creating a VPN Using Windows 2003 Server and XP Professional Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

ISTITUTO DI ISTRUZIONE SUPERIORE ALDO MORO

ISTITUTO DI ISTRUZIONE SUPERIORE ALDO MORO SEZIONE TECNICA A.S. 2015 2016 Programma svolto Prof.ssa: Roberta Giacomino Piovan Materia: Inglese Classe: V AM Anno Scolastico 2015/2016 Ore settimanali 3 TESTI IN USO : 1) BASIC ENGLISH TOOLS for Technical

More information