MANAGEMENT OF INFORMATION SECURITY AND FORENSICS



Similar documents
Industry regulations Jurisdictional regulations Legal defensibility Legal frameworks Legal research

Operational Procedure: ACNC Data Breach Response Plan

Hospitals. Internal Revenue Service Information about Schedule H (Form 990) and its instructions is at

1. Number of questions to be answered: ALL Multiple Choice (Section A) and 3 from 5 of the short answer questions (Section B)

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Summary of changes to Regulations recommended to the Senate by Graduate School Management Committee. Changed wording is shown in bold italics.

University of Mumbai Application for selection as Best College

COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials

Functional Valuation of Ecosystem Services on Bonaire

How To Get A Usb Power Button On Your Computer (For A Free) For A Year (For Free) (For An Ipad) (Free) (Apple) (Mac) (Windows) (Power) (Net) (Winows

TC Appendix 4E Appropriate Qualification tables. (Unless otherwise indicated all qualifications are valid if awarded by examination only)

Predicting Current User Intent with Contextual Markov Models

COLLEGE COUNSELING. SENIOR CLASS DATA Class Size: 103 students PBA Students: 24 students

Job/Task Analysis for an Energy/ Sustainability Manager: Public Comment Draft

25/8/94 (previous title) 08/06/12 [15/05/13 Formal Delegations amended] 15/12/95 13/10/00 2/11/01, 9/9/05, 14/12/11 5 yearly Immediately

Where preparation meets opportunity. My Academic Planner. Early Academic Outreach Program (EAOP)

Revised Conditions (January 2009) LLOYDS BANKING GROUP SHARE ISA CONDITIONS

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems. Distributed File Systems. Example: NFS Architecture

Usability Test Checklist

SecurView Antivirus Software Installation

REFUGEE PERCEPTIONS STUDY

A MESSAGE FROM CLAIMTEK

Reading. Minimum Spanning Trees. Outline. A File Sharing Problem. A Kevin Bacon Problem. Spanning Trees. Section 9.6

Menu Structure. Section 5. Introduction. General Functions Menu

SKILL TEST IR(H) HELICOPTER SE ME Application and report form A. Udfyldes af ansøgeren/to be filled out by the applicant:

Oracle PL/SQL Programming Advanced

Word Wisdom Correlations to the Common Core State Standards, Grade 6

Last time Interprocedural analysis Dimensions of precision (flow- and context-sensitivity) Flow-Sensitive Pointer Analysis

Job/Task Analysis for a Facility Manager: Public Comment Draft

the machine and check the components Black Yellow Cyan Magenta

TABLE OF CONTENTS CHAPTER TITLE PAGE

One Ring to Rule them All: Service Discovery and Binding in Structured Peer-to-Peer Overlay Networks

Schedule C. Notice in terms of Rule 5(10) of the Capital Gains Rules, 1993

A STUDY OF THE IMPACT OF CONSTRUCTION ACCIDENTS ON THE PROJECT CONTINUITY

The Swedish Radiation Protection Institute s Regulations on X- ray Diagnostics;

Total Trans Fat Content in Commercially Available Hydrogenated Vegetable Oils

San$Diego$Imperial$Counties$Region$of$Narcotics$Anonymous$ Western$Service$Learning$Days$$ XXX$Host$Committee!Guidelines$ $$

Discovering Petri Nets From Event Logs

Information Security Principles and Practices

REVIEW ON COMPARATIVE STUDY OF SOFTWARE PROCESS MODEL

Network Decoupling for Secure Communications in Wireless Sensor Networks

The Role of Dental Implants in the Management of Dento-Alveolar Trauma Part 1

Enterprise Risk Management Software Buyer s Guide

Certification and Training

Probabilistic maintenance and asset management on moveable storm surge barriers

B1 Project Management 100

Advanced Baseline and Release Management. Ed Taekema

The Splunk Guide to Operational Intelligence

Ethical and Professional Standards

Change Your History How Can Soccer Knowledge Improve Your Business Processes?

CompactPCI Connectors acc. to PIGMG 2.0 Rev. 3.0

Dinh Hong Giang 1,2, Ed Sarobol 2, * and Sutkhet Nakasathien 2 ABSTRACT

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 400 INCIDENT COMMAND: SYSTEM COORDINATION AND ASSESSMENT

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

This Version Not For Distribution EMR/EHR

A122 MARION COUNTY HEALTH BUILDING HVAC, GLAZING AND LIGHTING RENOVATION 75% DOCUMENTS 08/31/2015


Active Directory Service

Distributed Process Discovery and Conformance Checking

Software Monthly Maintenance (Non Accounting Use) Quick Reference Guide

STATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services

RIVISTE (NAZIONALI E INTERNAZIONALI)

PMP Certification Exam Prep Bootcamp

The following report presents financial data only. The full and binding version is available in Polish. K2 INTERNET S.A.

P U B L I C A T I O N I N T E R N E 1800 PARTIAL ORDER TECHNIQUES FOR DISTRIBUTED DISCRETE EVENT SYSTEMS: WHY YOU CAN T AVOID USING THEM

Switzerland. Studying in. Abbreviations inside. 3 Why Study in Switzerland? 4 Facts and Figures

Continuity Plan Template for Non-Federal Governments

Ad u lt Sc h o o l Class Catalog. New this Fall: Free Evening Babysitting Career Center SCHOOL CAMPUS DIRECTORY

Volume 48 Special Number May Abstracts.

Curriculum for the Master Program in Accounting, Auditing and Taxation at the University of Innsbruck School of Management

1. Who can use Agent Portal? 2. What is the definition of an active agent? 3. How to access Agent portal? 4. How to login?

Curriculum for the Master Program in Strategic Management at the University of Innsbruck School of Management

Introduction to Windchill Projectlink 10.2

NATIONAL OPEN UNIVERSITY OF NIGERIA. B. Sc Data Management. in the. School of Science & Technology

Corporate Compliance vs. Enterprise-Wide Risk Management

Qualification Qualification provider Key Certified International Wealth Manager Association of International Wealth Managers a

PG DIPLOMA IN GLOBAL STRATEGIC MANAGEMENT LIST OF BOOKS*

ISE 576 Industrial Ecology 1

LIST OF TABLES. 2.4 Variables Related to CRM Implementation Variables in Customer Retention at Commercial Banks 74

The following report presents financial data only. The full and binding version is available in Polish. K2 INTERNET S.A.

Workflow Administration of Windchill 10.2

TABLE OF CONTENTS CHAPTER DESCRIPTION PAGE

ISSUING THE AIR OPERATOR CERTIFICATE, OPERATIONS SPECIFICATIONS, AND COMPLETING THE CERTIFICATION REPORT

Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks

Oximeter Data Management Software. User Manual

Level 3 NVQ Diploma in Barbering ( )

The Splunk Guide to Operational Intelligence

"Charting the Course... MOC B Server Virtualization with Windows Hyper-V and System Center. Course Summary

Link-Disjoint Paths for Reliable QoS Routing

Learn AX: A Beginner s Guide to Microsoft Dynamics AX. Managing Users and Role Based Security in Microsoft Dynamics AX Dynamics101 ACADEMY

Transcription:

MANAGEMENT OF INFORMATION SECURITY AND FORENSICS CS 307 Ctlog Dsription PREREQUISITE: CS 0. Stuy of informtion surity n igitl fornsis using prtil s stuis. Emphsis is on vloping surity poliis, surity mngmnt n prtis, utiliztion of igitl fornsi tools n thniqus, risk mngmnt, surity projt mngmnt, n prottion mhnisms. Mjor omponnts of th ours r hns-on projts on igitl fornsi invstigtion n surity mngmnt s stuis. Cours Ojtivs To vlop n unrstning of si informtion surity n fornsis trminologis n onpts. To unrstn th prtil rlitis of thrts to informtion surity n th mthos, tools, n thniqus us to mitigt thm. To l to intify th typs of ttks, thir unrlying ntur, n th prolms n solutions ssoit with thm. To l to unrstn risk mngmnt, its importn, n its vlopmnt. To unrstn th rlvn of informtion surity poliis, th mols, n th guilins for thir vlopmnt. To unrstn igitl fornsis n invstigtion n to l to prform n in-pth nlysis n to rport signifint finings. Cours Mtrils Txtook Softwr Titl: Mngmnt of Informtion Surity, n. Author: Whitmn n Mttor Pulishr: Cours Thnology Dt: 008 Powrpoint rr

PDF rr Intrnt Browsr (MS Intrnt Explorr or Mozill Firfox) Supplmntry Rsours http://sr.nist.gov/pulitions/nistpus/ http://www.nip-vs.org/-shm http://www.nss.gov Dtil Cours Outlin Topi I Introution to th Mngmnt of Informtion Surity Ltur NSTISSC Surity mol Prinipls of Informtion Surity Mngmnt INFOSEC n OPSEC II Plnning for Surity.5 Vlus, Vision, n Mission Sttmnts Strtgi Plnning III Plnning for Surity Implmnttion Plnning for Contingnis Contingny Plnning 0.75 Businss Impt Anlysis 3 0.75 Inint Rspons Pln Disstr Rovry Pln Businss Continuity Pln IV Informtion Surity Poliy Poliy, Stnrs, n Prtis 4.5 Entrpris Poliy Issu Spifi Poliy Systm Spifi Poliy f g V Guilins for Efftiv Poliy Dvloping Surity Poliy Complin, Enformnt, Distriution, n Automt Tools Dvloping Surity Progrm.5

Topi Ltur Orgnizing for Surity VI VII Componnts of th Surity Progrm Informtion Surity Rols n Titls Implmnting Surity Eution, Trining, n Awrnss Progrms Surity Mngmnt Mols n Prtis Surity Mngmnt Mols Surity Mngmnt Prtis Mtris in Informtion Surity Mngmnt Emrging Trns in Crtifition n Arittion Crtifition n Arittion Risk Mngmnt: Intifying n Assssing Risk 4.5 Risk Mngmnt Risk Intifition Risk Assssmnt VIII Risk Mngmnt: Controlling Risk Risk Control Strtgis Mnging Risk Cost Bnfit Anlysis OCTAVE Mtho IX Prottion Mhnism 6 Ass Control Firwlls f Intrusion Dttion Systms Rmot Ass Prottion Wirlss Ntwork Prottion: WEP, WPA Snning n Anlysis tools g Cryptogrphy X Prsonnl n Surity Stffing n Surity Funtions Informtion Surity Profssionl Crntils: 3

Topi CISSP, CISA, CISM, GIAC, SCP, CCE, CIFI, SSCP Employmnt Poliis n Prtis Ltur Surity Custoin XI Lws n Ethis 3 Lgl Environmnt 0.5 Rlvnt US Lws.5 Intrntionl Lws n Lgl Bois Poliy vs Lw 0.5 Profssionl Orgniztions n thir Cos of Ethis f Orgniztionl Liility 0.5 XII Informtion Surity Projt Mngmnt Projt Mngmnt XIII Projt Mngmnt Tools Digitl Fornsis n Invstigtions Digitl Fornsi Prosss.5 Ars of Invstigtion 0.5 Mthos of Aquisition Fornsi Anlysis Fornsi Tools f Fornsi Rports 0.5 XIV Cs Stuy Rport Cours Poliy Exmintion Protoring Th JSU poliy for protoring of xmintion for n onlin ours is foun in th following link: http://istn.jsu.u/dlprotoring.htm Pls not tht, if stunt livs in th Jksonvill r or nry, th instrutor will mk rrngmnt for tht stunt to tk th xm on mpus. Othrwis, th stunt must sk somon to t s tsting gnt or protor. Th stunt is rsponsil for ny ost ssoit with xm protoring.

Gring Poliy Tst 5% Tst 5% Onlin isussion prtiiption Homworks/Cs Stuy 5% 5% Finl Exm 30% Gring sl (Prntg) A 90 - ov B 80-89 C 70-79 D 60-69 F low 60 Othr Cours Poliis Any iniviul who qulifis for rsonl ommotions unr th Amrins With Disilitis At or Stion 504 of th Rhilittion At of 973 shoul ontt th Instrutor immitly. Cours Syllus Th syllus for this ours n ownlo hr in PDF formt. 008 Jksonvill Stt Univrsity