Course Design Document. Information Security Management. Version 2.0

Size: px
Start display at page:

Download "Course Design Document. Information Security Management. Version 2.0"

Transcription

1 Course Design Document Information Security Management Version 2.0 January 2015

2 Table of Content 1 Versions History Overview of Security and Trust Course... 4 Synopsis Prerequisites Objectives Basic Modules Instructional Staff Output and Assessment Summary Midterm test (10%)... Error! Bookmark not defined. 3.2 In-Class Participation (20%) Graded Assignment (20%)... Error! Bookmark not defined. 3.4 Project (40%) Final Exam (10%) Grades release schedule Group Allocation for Groups/Assignments... Error! Bookmark not defined. 5 Classroom Planning Course Schedule Summary Weekly Plan List of Information Resources and References Tooling Tool 14 Description Remarks Learning Outcomes, Achievement Methods and Assessment... 14

3 1 Versions History Version Description of Changes Author Date V st Draft SITSA 22 June 2012 V nd Draft SITSA 29 August 2012 V 1.0 Final SITSA 7 January 2014 V st Draft SITSA 28 October 2014 V nd Draft SITSA 04 November 2014

4 2 Overview of Security and Trust Course Synopsis The Information Security (IS) Management course aims to provide students with insights to today s information security challenges, particularly in the area of Critical Information Infrastructure and the urgency to better secure these assets. Through case studies discussions and sharing of real life, on-the-job experiences in the areas of Consultancy, Critical Information Infrastructure Protection and Cyber Response, the course is designed to allow students to gain different perspectives to solving real world security problems from a professional and operational view point. 2.1 Prerequisites Students should have taken Basic Information Security and Trust Course. 2.2 Objectives Upon finishing the course, students are expected to: Understand how important security principles must be adhered to when securing the infrastructures. Understand the importance of balancing security, operational effectiveness and cost Be able to analyze and to aptly secure the cyber perimeter of the infrastructures against cyber attacks Be able to aid an organization in its response and recovery from cyberattacks and to further enhance its security implementations. 2.3 Basic Modules Prevention Risk Assessment Security Architecture Security Examination and Pro-Active Detection Response Incident Response Cyber Response - Malware Cyber Response - Forensics

5 Critical Information Infrastructure Protection (CIIP) 2.4 Instructional Staff SITSA officers 3 Output and Assessment Summary Week Output Weightage in % 1 2 Project Proposal Recess Week Project Report 40% 13 Presentation Exam 40% Class Participation 20% TOTAL 100% 3.1 In-Class Participation (20%) Evaluation will be based on o Attendance o Participation in in-class activities 3.2 Project (40%) Students are required to undertake a project that will allow them to apply the skills and the knowledge that they have been taught in class

6 1. BYOD: What are the cyber-security issues that you need to handle when you use your own smart devices for work purposes? What can be done about them and how effective are they? 2. Smart Nations: Discuss the potential cyber-security considerations. What are the threats and risks? What are the security implementations to put in place and how effective are they? 3. The Australian Government Department of Defense released 35 strategies that may be implemented to mitigate targeted cyber intrusions ( table.htm). They have singled out 4 top strategies to do so. Discuss the effectiveness of these top 4 strategies against APT. 4. Dynamic Encryption: Based on an article (the article will be provided in Week 1), understand the approach and evaluate its potential and usefulness in information security. 5. People, processes and technologies: Discuss the importance of people, processes and technologies in information technology security. Deliverables 1. Project Proposal Proposal to be submitted on Week 2, start of lecture It should not exceed 500 words, single column, Times New Romans/Arial, font size 13, 1.5 line spacing. Names of team members and project title must be included It should include key points/issues that the team is looking at as well as a brief workplan of how the team is going to approach the topic Proposals that are not approved must be resubmitted for subsequent approval 2. Project Report Report to be submitted on Week 12, 27 th March, Friday, 10am It should not exceed 3,000 words, single column Times New Romans/Arial, font size 13, 1.5 line spacing. Names of team members, project title, executive summary and references must be included 3. Project Presentation Oral presentation will be delivered by the team in 20 minutes, followed by a 10 minutes Q&A Report Grading: The grading is hugely based on o Whether the teams have shown a sound understanding of the issues revolving the selected topic o Whether the teams have shown sufficient width and depth to analysing the impact of their selected topic

7 o Whether the teams are able to write the report and present in a coherent manner o The originality, the recommendations and the comprehensiveness of considerations on the selected topic Dates to Note: o Week 2: Proposal Due o Weeks 12: Report Due o Week 13/14: Presentation 3.3 Final Exam (40%) Week 15 Covers all materials in all lectures Include multiple choice questions and short answer questions 3.4 Grades release schedule Participation Final exam Project at the end of term at the end of term at the end of term 4 Classroom Planning There is one session of 3 hours classroom each week. 4.1 Course Schedule Summary Wk Topic Readings Classroom activity Assignment/Discussion/ Output/ Remarks Presentation + Lecture 1 Administrative/ Risk Assessment 2 Risk Assessment/Se curity Architecture/ Security Evaluation / Pro- Active Detection 4 Project work proposal sitthrough with Lecture + Case studies + Discussion + Game Play 3 Lecture + Case Studies + Discussion + Game Play Project work proposal discussion Project proposal due

8 teams 5 CIIP Lecture + Case Studies + Discussion + videos 6 Lecture + Case Studies + Discussion 7 Project work Project work discussion 8 Recess Recess Recess 9 Incident Lecture + Case Studies + Response Discussion Framework 10 Lecture + Demonstration + 11 Digital Forensics Hands-on Lecture + Case Studies + Hands-on Malware 12 Project work Project work discussion Project report due Project Presentation Project Presentation 13 Project Presentation 14 Study Week 15 Final Exam 4.2 Weekly Plan Week: 1 Session: Administrative briefing Risk Assessment Lecture Project: Project assignment and requirements Team Course material is available for download from the course website Students may either do the project on their own or in groups (2-3people) Week: 1/2/3 Case Study + Discussion Lecture Showing that cyber threats really happen and they may result in severe consequences for businesses o Differentiating amongst the different threat agents Defining and assessing the problems that cyber threats have on businesses from the perspectives of confidentiality, integrity and availability (CIA) Identifying the various assets of a typical IT system that needs to be protected Understanding the 5 security objectives Confidentiality, Integrity, Availability, Non-authentication and Non-repudiation Understanding and formulating threat scenarios Recommending high level security controls to mitigate

9 assessed threats Case Study + Discussion Examining new technologies with promises of benefits that comes with its share of security woes Game Play Engaging the students through game play to illustrate and put to play the concepts covered in the lecture Main Case Study: From SOHO to Enterprise Reference: Reading materials from various sources will be provided to the students one week before lecture Additional materials covered during class activities, at lectures, will be provided to the students within the week of the lecture Students need to show clearly that cyber threats exist and the consequences of falling victim to them Students need to understand cyber threats from the perspectives of Confidentiality, Integrity, Availability, Non-authentication and Non-repudiation Week: 1/2/3 Lecture Revisiting what needs to be protected Formulating specific security requirements to mitigate threats surfaced, covering technical topics such as, o Cryptography o Sever Security o DB Security o Network Security Drawing up IT security architectures and developing strategies while taking business goals and the 5 security objectives into consideration Case Study + Discussion Illustrating the complexity of balancing security needs with operational and cost considerations Showing the importance of having security measures implemented at the very start Game Play Engaging the students through game play to illustrate and put to play the concepts covered in the lecture Main Case Study: Virtualisation and Cloud Computing Reference: Reading materials from various sources will be provided to the students one week before lecture Additional materials covered during class activities, at lectures, will be provided to the students within the week of the lecture Students need to understand the importance of implementing security measures into the system architecture from the very start. Students need to know how to balance security requirements, operation considerations and cost Week: 1/2/3 Lecture + Case Study + Discussion Knowing and understanding the different cyber security tests and their purposes

10 Understanding the need for security examination and certification of cyber security products/technologies/solutions Lecture Appreciating the different types of security testing and their purpose (e.g. SSAT, PT) Knowing and understanding the various stages of testing that needs to be conducted on IT systems to assure that security objectives have been met. For e.g. o Test objective definition o Test plan formulation o Test execution o Reporting Importance of security examination and certification Game Play Student presentation and debrief of game play Engaging the students through game play to illustrate and put to play the concepts covered in the lecture Reference: Reading materials from various sources will be provided to the students one week before lecture Additional materials covered during class activities, at lectures, will be provided to the students within the week of the lecture Students need to understand the importance of doing security examination on cyber security products/technologies/solutions Students need to understand the various stages of testing to ensure that security objectives have been met Students need to realise and appreciate the implications that secure systems have on businesses Week: 4 Project Proposal Discussion Week: 5/6 Lecture + Discussion Introducing what Critical Information Infrastructure (CII) is o Introducing CII Security o Definition of CII (Singapore context) o Differences between the Enterprise and SCADA systems o The concerns on SCADA Cyber security concepts Availability Integrity Confidentiality (AIC) and Confidentiality Integrity Availability (CIA) Security breaches and their impacts o To Singapore s national security, economy and public safety o Looking at CIIs becoming targets at the national level Case Studies + Discussion Illustrating the impact of damages resulting from CIIs security breaches. Case studies presented are in order of increasing scale of damages, ranging from prankster attacks to targeted ones, from local to national level scale attacks Main Case Study: StuxNet

11 Reference: Reading materials from various sources will be provided to the students one week before the actual lecture Students need to understand what CIIs are Students need to understand the impact of damages resulting from security breaches and to appreciate the need to protect the CIIs Week: 5/6 Lecture + Discussion Critical Information Infrastructure Protection Illustrating the vulnerabilities of the control systems (SCADA) used in CIIs o Myth of ICS invulnerability Understanding how to manage the risks, threats and attacks Understanding the security mechanisms and the attack routes o Improving cyber security of ICS networks o Being security aware o Knowing the security management implementation issues and guidelines and being aware of the impression that management has of ICS security Being aware and understanding the heightened vulnerabilities of the ICS due to increased interconnectivity amongst systems Main Case Study: StuxNet Reference: Reading materials from various sources will be provided to the students one week before the actual lecture Students need to understand the mechanisms used to protect SCADA systems Students need to be aware of the industry standards Students need to be aware of the various current security products available in the industry Week: 7 Project Report Discussion Week: 8 (Recess week: no class) Week: 9 Incident Response Lecture Incident Response Framework o Focusing on the Incident Response Framework, its key components and the critical role that incident response play in current times. o Understanding what is required for an Incident Response Framework to be put in place o Knowing how to communicate with other Incident Response teams effectively and efficiently. Case Study + Discussion APEC 2009 and the role that Incident Response played o headers in incident response Main Case Study: APEC 2009 Reference: Handbook for Computer Security Incident Response Teams (CSIRTs) by Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2003 Computer Security Incident Handling Guide (Draft), Special Publication , Revision 2

12 (Draft) by NIST (National Institute of Standards and Technology) A Step-by-Step Approach on How to Set Up a CSIRT Deliverable WP2006/5.1 (CERT-D1/D2) by ENISA Good Practices for Security Incident Management ENISA (European Network and Information Security Agency) CSIRT Services RFC 2350 Expectations for Computer Security Incident Response SANS 504 Hacker Techniques, Exploits and Incident Handling Student need to understand the importance, the purpose of cyber incident response and the role it plays in today s landscape Students need to know the key components of cyber incident response Students need to be aware of what is needed for efficient and effective communication with other incident response teams Week: 10 Digital Forensics Lecture Cyber forensics o Covering principles, cyber footprints, transiting from traditional static forensics to cloud-based forensics, forensics for SCADA systems, forensic challenges, virtualisation and chain-of-custody procedures o Covering the mind-set of an investigator and examiner Discussion APEC 2009 incident and the applications of forensics to this case. Role of forensics in Incident Response Life Cycle Concerns of forensics investigators Importance of following proper chain-of-custody procedure Main Case Study: APEC 2009 Reference: Real Digital Forensics (Computer Security and Incident Response), Keith J.Jones Chapter 9 Digital Forensics for Network, Internet and Cloud Computing, Terence V. Lillard Chapter 12 Virtualization and Forensics, Diane Barrett Chapter 5 7, Windows Forensics Analysis Toolkit, Advanced Analysis Techniques for Windows 7 3E, Harlan Carvey Chapter 1 Techno Security s Guide to E-discovery and Digital Forensics, Jack Wiles Chapter 2 Alternate Data Storage Forensics, Tyler Cohen & Amber Schroader Chapter 1 Hands-on/Lab: Academic-licensed forensic tools Students need to be aware of how digital tools may be used to uncover information and critical data Students need to be aware of the challenges pose to forensics and uncovering of digital tracks in view of emerging new technologies such as cloud and virtualization Students need to understand the importance of following forensic procedures Week: 11 Malware Analysis Lecture Malware 101 o Introducing various categories and types of malware, common attack vectors and mechanisms, APT, basic malware analysis processes, tools o Showing the issues and challenges of malware

13 o o analysis and demonstrating malware in action Understanding the need for containment Knowing the importance of preserving evidence to aid in malware eradication and system recovery Case Study + Discussion + Providing a wrap-up to Cyber Response segment Demonstration Combining both Incident Response and Malware Analysis Main Case Study: APEC 2009 Reference: Forensic Discovery, Dan Farmer, Wiestse Venema (Addison-Wesley Professional) M Trends 2010 the advanced persistent threat, Mandiant Students need to have a basic understanding of malware Students need to understand the essential concepts of malware investigation Week: 12 Project Report Discussion Report due Week: 13 Project Presentation Students should learn from each other Week: 14 (review week: no class) Week: 15 Final Quiz MCQs Short Application Questions Students may leave other the Quiz Students may choose to stay if they have questions 5 List of Information Resources and References Reading materials and reference websites will be made available in the course slides.

14 6 Tooling Tool Description Remarks Hex Editor Freeware Hands-on exercises and demo Lab exercises 8 Learning Outcomes, Achievement Methods and Assessment 1 2 Information Security Management Integration of business & technology in a sector context 1.1 Business IT value linkage skills 1.2 Cost and benefits analysis skills 1.3 Business software solution impact analysis skills IT architecture, design and development skills 2.1 System requirements specification skills 2.2 Software and IT architecture analysis and design skills YY YY 2.3 Implementation skills YY 2.4 Technology application skills YY Course-specific core competencies which address the Outcomes Analyzing the security requirement and the vulnerabilities of the infrastructures. Deploying security tools to harden it Analyzing the vulnerabilities of an infrastructure, the functional and non-functional requirements of it, to harden it through the application of security concepts Having the various security tools and concepts to harden infrastructures Using existing technologies to harden infrastructures Faculty Methods to Assess Outcomes Projects, In-class discussions and class activities Projects, In-class discussions, class activities and case studies analysis Class activities and case studies analysis In-class discussions, Class activities and case studies analysis 3 Project management skills 3.1 Scope management skills 3.2 Risks management skills 3.3 Project integration and time Y Develop and execute project Project proposal, in-

15 management skills plans and maintain it class activities 3.4 Configuration management skills 3.5 Quality management skills 4 Learning to learn skills 4.1 Search skills Y 4.2 Skills for developing a methodology for learning 5 Collaboration (or team) skills: 5.1 Skills to improve the effectiveness of group processes and work products Change management skills for 6 enterprise systems 6.1 Skills to diagnose business changes 6.2 Skills to implement and sustain business changes Skills for working across 7 countries, cultures and borders 7.1 Cross-national awareness skills 7.2 Business across countries facilitation skills 8 Communication skills 8.1 Presentation skills YY Y Study and search for information that may be applied to their case studies, assignments and projects Effectively communicate and resolve conflicts while working in a randomly chosen team Students will need to apply this when doing project presentation Projects and in-class activities In-class discussion and activities Project and in-class activities 8.2 Writing skills YY Students will need to submit a project proposal and a project report Project Y YY This sub-skill is covered partially by the course This sub-skill is a main focus for this course

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0 Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5

More information

Course Design Document. IS403: Advanced Information Security and Trust

Course Design Document. IS403: Advanced Information Security and Trust Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...

More information

Course Design Document: IS412: Enterprise Business Solutions Enterprise Process Integration using SAP Software. Version 1.6

Course Design Document: IS412: Enterprise Business Solutions Enterprise Process Integration using SAP Software. Version 1.6 Course Design Document: IS412: Enterprise Business Solutions Enterprise Process Integration using SAP Software Version 1.6 16 th June 2010 Table of Content 1. Versions History...4 2. Overview of the Enterprise

More information

Course Design Document. IS103 Computational Thinking (CT)

Course Design Document. IS103 Computational Thinking (CT) Course Design Document IS103 Computational Thinking (CT) Version 1.0 10 October 2011 Computational thinking confronts the riddle of machine intelligence: What can humans do better than computers? What

More information

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc. Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Course Design Document. IS417: Data Warehousing and Business Analytics

Course Design Document. IS417: Data Warehousing and Business Analytics Course Design Document IS417: Data Warehousing and Business Analytics Version 2.1 20 June 2009 IS417 Data Warehousing and Business Analytics Page 1 Table of Contents 1. Versions History... 3 2. Overview

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

The State of Industrial Control Systems Security and National Critical Infrastructure Protection The State of Industrial Control Systems Security and National Critical Infrastructure Protection Emerging Threats Tinuade Adesina, Lulea University of Technology Sweden IT Security for the Next Generation

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens Robert Malmgren Smart Grid Security Challenges - Legacy and Infrastructure Burdens Short bio Robert Malmgren Independent consultant that have worked with utility companies regarding IT- and info sec since

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION MOST OF THE IMPORTANT DATA LOSS VECTORS DEPEND ON COPYING files in order to compromise

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

Risk Management in Practice A Guide for the Electric Sector

Risk Management in Practice A Guide for the Electric Sector Risk Management in Practice A Guide for the Electric Sector Annabelle Lee Senior Technical Executive ICCS European Engagement Summit April 28, 2015 Before we continue let s get over our fears and myths

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Security Controls Implementation Plan

Security Controls Implementation Plan GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 Table of Contents Executive Summary 3 Introduction 3 Security Controls Implementation

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

defense through discovery

defense through discovery defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst

More information

ITS425: Ethical Hacking and Penetration Testing

ITS425: Ethical Hacking and Penetration Testing ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Stop advanced targeted attacks, identify high risk users and control Insider Threats TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

ITS425: Ethical Hacking and Penetration Testing

ITS425: Ethical Hacking and Penetration Testing ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

Defensible Strategy To. Cyber Incident Response

Defensible Strategy To. Cyber Incident Response Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack

More information

Master of Science in Information Systems & Security Management. Courses Descriptions

Master of Science in Information Systems & Security Management. Courses Descriptions Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: [email protected]

More information

N-Dimension Solutions Cyber Security for Utilities

N-Dimension Solutions Cyber Security for Utilities AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015 Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are

More information

COURSE SYLLABUS BMIS 342 CYBER SECURITY

COURSE SYLLABUS BMIS 342 CYBER SECURITY Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Curran, K. Tutorials. Independent study (including assessment) N/A

Curran, K. Tutorials. Independent study (including assessment) N/A MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

POLICIES TO MITIGATE CYBER RISK

POLICIES TO MITIGATE CYBER RISK POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned

More information

Cyber Security for SCADA/ICS Networks

Cyber Security for SCADA/ICS Networks Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

ITU-IMPACT Training and Skills Development Course Catalogue

ITU-IMPACT Training and Skills Development Course Catalogue ITU-IMPACT Training and Skills Development Course Catalogue Management Track Technical Track Course Area Management Incident Response Digital Forensics Network Application Law Enforcement Foundation Management

More information

Personal Security Practices of the CAO

Personal Security Practices of the CAO Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

SOLUTION BRIEF. Next Generation APT Defense for Healthcare SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their

More information

CIT 217 Security + Network Security Fall 2015

CIT 217 Security + Network Security Fall 2015 CIT 217 Security + Network Security Fall 2015 Instructor: Laura Pike Email: [email protected] Phone: 775-753-2288 Office: HTC 131 Office Hours: Mon & Wed. 1:30 2:30pm via Cranium Café Tus. 7-8pm via

More information

Data Center security trends

Data Center security trends Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:

More information