CIS 4360: INTRODUCTION TO COMPUTER SECURITY



Similar documents
Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Personal Data Security Breach Management Policy

COE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are:

Internet and Policy User s Guide

Course Syllabus PADM Management of Health Care Agencies College of Public Service and Urban Affairs Tennessee State University

Creating an Ethical Culture and Protecting Your Bottom Line:

How To Get A Credit By Examination

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Letter of Engagement. as instructed from time to time in respect of your/the company/trusts affairs

Data Protection Policy & Procedure

GUIDANCE FOR BUSINESS ASSOCIATES

Environmental Science

Malpractice and Maladministration Policy

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

Master s Degree Program

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days

Frequently Asked Questions

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

Systems Support - Extended

Business Continuity Management Systems Foundation Training Course

REHABILITATION INSTITUTE REHABILITATION COUNSELING and ADMINISTRATION

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

LIS/KM 4223/5223 Information Technology Management Fall 2010 Online Delivered Course

BridgeValley Community and Technical College Financial Aid Office Maximum Hour Financial Aid Suspension Appeal Process

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company,

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

To achieve these objectives we will use a combination of lectures, cases, class discussion, and exercises.

First Global Data Corp.

Data Protection Act Data security breach management

DisplayNote Technologies Limited Data Protection Policy July 2014

Hybrid Course Design and Instruction Guidelines

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

ensure that all users understand how mobile phones supplied by the council should and should not be used.

Online Course Syllabus Template

expertise hp services valupack consulting description security review service for Linux

Title IV Refund Policy (R2T4)

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

Course. Term Summer 2016 Instructors Chad R. Durham, MBA, PhD. Candidate, VSE Catalog Description.

GENERAL PSYCHOLOGY (PSYC&100.09) Course Syllabus

ITIL V3 Service Offerings and Agreements (SOA) Certification Program - 5 Days

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

The Ohio Board of Regents Credit When It s Due process identifies students who

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

GENERAL EDUCATION. Communication: Students will effectively exchange ideas and information using multiple methods of communication.

Australian Institute of Psychology. Human Research Ethics Committee. Terms of Reference

USABILITY TESTING PLAN. Document Overview. Methodology

Required Articles Cervone, H. F. (2004). How not to run a digital library project. OCLC Systems & Services, OCLC Syst. Serv. (UK), 20(4),

The University of Toledo Paralegal Studies Program College of Social Justice and Human Service

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

COURSE PROFILE. Business Data Analysis IT431 Fall

How To Ensure That The Internet Is Safe For A Health Care Worker

ANATOMY & PHYSIOLOGY 2401

IT Help Desk Service Level Expectations Revised: 01/09/2012

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

Corporate Standards for data quality and the collation of data for external presentation

ARE YOU INTERESTED IN THE PRIOR LEARNING ASSESSMENT (PLA) PROGRAM?

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

ICT Diploma of Information Technology Networking

CMS Eligibility Requirements Checklist for MSSP ACO Participation

Process for Responding to Privacy Breaches

Workplace Expectations Samples. Employees are responsible for accurately reporting work time in HRMS.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Software and Hardware Change Management Policy for CDes Computer Labs

Human Resources Policy pol-020

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

Coordinating Dual Eligibles Medicare and Medicaid Managed Medical Assistance Benefits

Semester/Year of Course

Doctoral Framework Guidelines

EDUC X507: Foundations of Teaching in Higher Education

UNIVERSITY OF LETHBRIDGE. Mgt 4390 Z Leading Organizational Change. Course Outline

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Information Services Hosting Arrangements

Newborn Blood Spot Failsafe Solution (NBSFS) Operational Level Agreements. Part B: Child Health Record Department (CHRD) Users

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM

Key Steps for Organizations in Responding to Privacy Breaches

Checklist for Columbia State Community College s Course Creation Process

Williamson County Board of Education Procedures and Guidelines

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents

IT Account and Access Procedure

Transcription:

CIS 4360: INTRODUCTION TO COMPUTER SECURITY Flrida A&M University Cmputer and Infrmatin Sciences Cllege f Arts & Sciences Curse Prerequisite: Cmputer Science majr r permissin f the instructr Required Textbk: Curse Websites: M. Whitman and H. Mattrd. Principles f Infrmatin Security, 4 th Editin (Curse Technlgy, 2012). [ISBN: 1-111-13821-4] http://famu.blackbard.cm (Curse Material & practice exercises) Curse Descriptin: Curse Objectives: An intrductin t the varius technical and administrative aspects f infrmatin security and assurance. This curse prvides the fundatin fr understanding the key issues assciated with prtecting infrmatin assets, determining the levels f prtectin and respnse t security incidents, and designing a cnsistent, reasnable infrmatin security system, with apprpriate intrusin detectin and reprting features. The purpse f the curse is t prvide the student with an verview f the field f infrmatin security and assurance. Students will be expsed t the spectrum f security activities, methds, methdlgies, and prcedures. Cverage will include inspectin and prtectin f infrmatin assets, detectin f and reactin t threats t infrmatin assets, and examinatin f pre- and pst-incident prcedures, technical and managerial respnses, and an verview f the infrmatin security planning and staffing functins. After cmpleting the curse, students will be able t: Identify and priritize infrmatin assets Identify and priritize threats t infrmatin assets Define an infrmatin security strategy and architecture Plan fr and respnd t intruders in an infrmatin system Describe legal and public relatins implicatins f security and privacy issues Present a disaster recvery plan fr recvery f infrmatin assets after an incident POLICIES: Attendance: The instructr expects yur attendance at each and every class. Attendance will be checked n a daily basis. In accrdance with the University's plicy, mre than ne unexcused class absence per credit hur f a curse can result in yur dismissal frm the curse with a grade f F. Grade perfrmance is a demnstrated functin f attendance, preparatin, and participatin. Yu can get behind very easily by skipping classes, resulting in a pr understanding f the material, which will shw up as a pr grade fr the class. Any class sessins missed by the student are the student's respnsibility t make up, nt the instructr's. Late arrival that causes disruptin, early departure that causes disruptin, excessive cnversatin amng students (a disruptin in its wn right), inapprpriate use f electrnic devices that cause disruptins and ther actins that disrupt the classrm are unacceptable. Assessment: Quizzes 10% Exam 1 15% Exam 2 15% Exam 3 15% Final Exam 10% Assignments 15% Prjects/Presentatins 20% 100%

Grade Evaluatin: A 90% - 100% B 89% - 80% C 79% - 70% D 69% - 60% F 59% r belw Evaluatin criteria explained: Students are expected t be active participants in each class meeting. Students are expected t regularly ask questins, share bservatins, and cntribute relevant persnal experiences. The exams will cnsist f bjective questins and will require a technlgical cmprehensin that cvers the lecture material and assigned readings. The assignments will cnsist f a number f individual in-class and hmewrk tasks. Students will be given specific guidance n the amunt f cllabratin permitted fr each assignment. Unless therwise specified, all assignments are individual assignments, and thus must be cmpletely the riginal wrk f the student submitting them and include prper citatins t the published wrk f thers. (Refer t the Academic Integrity Statement sectin f the syllabus fr additinal guidance.) Quizzes: Quizzes will be given thrughut the semester. Quizzes will always cver the material cvered since the last quiz r exam and any material the student is respnsible fr. The quizzes will be cmbinatins f bjective and shrt-answer questins. Makeup quizzes will nt be given. Any class material missed by the student is the student's respnsibility t acquire. Exams: There will be three (3) nncumulative examinatins. The cntent will cme frm the text and ther material presented in lecture sessins as well as labs. Nte that material presented in class and in lab will supplement the assigned reading. Therefre, class attendance and gd nte taking are essential tactics fr success. There will be n make-up examinatins. It is the student s respnsibility t arrange fr an excused absence befre the exam. A grade f zer will be assigned fr all exams missed withut an excused absence. If an emergency arises n the day f the exam, and the instructr deems that the absence is excused, then the weight f the final exam may be increased t replace the exam. Enrllment Plicy: Only thse students wh are enrlled in the class may attend lectures, receive assignments, take quizzes and exams, and receive a grade in the class. If a student is administratively withdrawn frm this curse, he r she will nt be permitted t attend class, nr will they receive any grade fr the class. E-mail Messages: Remember t put the curse name and sectin number in the subject field f every e-mail message that yu send the instructr.

Lab Assignments: Numerus Lab sessins and accmpanying assignments are due thrughut the term. Details and due dates are available n the curse website (http://famu.blackbard.cm). Each lab assignment is weighted equally. N lab make-up sessins are available, and late assignments will nt be accepted! If yu are unable t arrive at the lab n time n the day f the lab sessin and must then perfrm the lab wrk n yur wn, yu are respnsible fr turning in the lab assignment n time. Yu may turn the assignment in early. Please adhere t lab submissin requirements fr each lab. General Assignments: General assignments are due thrughut the term. Details and due dates fr these assignments are available n the curse website (http://famu.blackbard.cm). Each f the assignments are weighted equally. Late assignments will nt be accepted! Yu may turn the assignment in early.

White Hat Agreement and Cde f Ethics This dcument prvides further guidelines fr the curse exercises. If yu have questins abut any f these guidelines, please cntact the curse instructr. When in dubt, the default actin shuld be t ask the instructr. 1) ANY data that is stred utside f the curse accunts can be used nly if it has been explicitly and intentinally published, (e.g., n a Web page), r if it is in a publicly available directry, (e.g., /etc, /usr ). 2) Scial engineering fr infrmatin abut individuals frm anyne utside f the curse is disallwed. 3) Impersnatin, e.g., frgery f electrnic mail, is disallwed. 4) If yu discver a way t gain access t any accunt ther than yur wn (including rt), d NOT access that accunt, but immediately infrm the curse instructrs f the vulnerability. If yu have inadvertently already gained access t the accunt, IMMEDIATELY exit the accunt and infrm the curse instructrs. 5) All explratins shuld be targeted specifically t the assigned curse accunts. ANY tl that indiscriminately explres nncurse accunts fr vulnerabilities is specifically disallwed. 6) Using the Web t find explratin tls and methds is allwed. In yur reprts, prvide full attributin t the surce f the tl r methd. 7) If in dubt at all abut whether a given activity falls within the letter r spirit f the curse exercise, discuss the activity with the instructr BEFORE explring the apprach further. 8) Yu can participate in the curse exercise nly if yu are registered fr a grade in the class. ANY vilatin f the curse guidelines may result in disciplinary r legal actin.

White Hat Agreement Flrida A&M University Cmputer and Infrmatin Sciences Cllege f Arts & Sciences Cde f Ethics Preamble: (Surce: www.isc2.rg Cde f ethics) Safety f the cmmnwealth, duty t ur principals, and t each ther requires that we adhere, and be seen t adhere, t the highest ethical standards f behavir. Therefre, strict adherence t this cde is a cnditin f labratry admissin. Cde f Ethics Canns: Prtect sciety, the cmmnwealth, and the infrastructure. Act hnrably, hnestly, justly, respnsibly, and legally. Prvide diligent and cmpetent service t principals. Advance and prtect the prfessin. The fllwing additinal guidance is given in furtherance f these gals. Prtect sciety, the cmmnwealth, and the infrastructure Prmte and preserve public trust and cnfidence in infrmatin and systems. Prmte the understanding and acceptance f prudent infrmatin security measures. Preserve and strengthen the integrity f the public infrastructure. Discurage unsafe practice. Act hnrably, hnestly, justly, respnsibly, and legally Tell the truth; make all stakehlders aware f yur actins n a timely basis. Observe all cntracts and agreements, express r implied. Treat all cnstituents fairly. In reslving cnflicts, cnsider public safety and duties t principals, individuals, and the prfessin in that rder. Give prudent advice; avid raising unnecessary alarm r giving unwarranted cmfrt. Take care t be truthful, bjective, cautius, and within yur cmpetence. When reslving differing laws in different jurisdictins, give preference t the laws f the jurisdictin in which yu render yur service. Prvide diligent and cmpetent service t principals Preserve the value f their systems, applicatins, and infrmatin. Respect their trust and the privileges that they grant yu. Avid cnflicts f interest r the appearance theref. Render nly thse services fr which yu are fully cmpetent and qualified. Advance and prtect the prfessin Spnsr fr prfessinal advancement thse best qualified. All ther things equal, prefer thse wh are certified and wh adhere t these canns. Avid prfessinal assciatin with thse whse practices r reputatin might diminish the prfessin. Take care nt t injure the reputatin f ther prfessinals thrugh malice r indifference. Maintain yur cmpetence; keep yur skills and knwledge current. Give generusly f yur time and knwledge in training thers. As part f this curse, yu may be expsed t systems, tls, and techniques related t infrmatin security. With prper use, these cmpnents allw a security r netwrk administratr t better understand the vulnerabilities and security precautins in effect. Misused, intentinally r accidentally, these cmpnents can result in breaches f security, damage t data, r ther undesirable results. Since these lab experiments will be carried ut in part in a public netwrk that is used by peple fr real wrk, yu must agree t the fllwing befre yu can participate. If yu are unwilling t sign this frm, then yu cannt participate in the lab exercises.

Student agreement frm: I agree t: nly examine the labratry resurces fr privacy vulnerabilities (if applicable) reprt any security vulnerabilities discvered t the curse instructrs immediately, and nt disclse them t anyne else maintain the cnfidentiality f any private infrmatin I learn thrugh the curse exercise actively use the labratry resurces with the understanding that its cntents and actins may be discvered by thers hld harmless the curse instructrs and Flrida A&M University fr any cnsequences f this curse abide by the cmputing plicies f Flrida A&M University and by all laws gverning use f cmputer resurces n campus I agree t NOT: attempt t gain rt access r any ther increase in privilege n any Flrida A&M University wrkstatin disclse any private infrmatin that I discver as a direct r indirect result f this curse exercise take actins that will mdify r deny access t any data r service nt wned by me attempt t perfrm any actins r use utilities presented in the labratry utside the cnfines and structure f the labs utilize any security vulnerabilities beynd the target accunts in the curse r beynd the duratin f the curse exercise pursue any legal actin against the curse instructrs r Flrida A&M University fr cnsequences related t this curse Mrever, I cnsent fr my curse accunts and systems t be examined fr security and privacy vulnerabilities by ther students in the curse, with the understanding that this may result in infrmatin abut me being disclsed (if applicable).

The abve agreement has been explained t me t my satisfactin. I agree t abide by the cnditins f the Cde f Ethics and f the White Hat Agreement. Curse & Semester Instructr Name Print Name Signature Date Acknwledgment and Acceptance f Academic Integrity Statement: In any academic cmmunity, certain standards and ethical behavir are required t ensure the unhindered pursuit f knwledge and the free exchange f ideas. Academic hnesty means that yu respect the right f ther individuals t express their views and pinins, and that yu, as a student, nt engage in plagiarism, cheating, illegal access, misuse r destructin f cllege prperty, r falsificatin f cllege recrds r academic wrk. As a member f the University academic cmmunity, yu are expected t adhere t these ethical standards. Yu are expected t read, understand, and fllw the cde f cnduct as utlined in the graduate and undergraduate catalgs. Yu need t be aware that if yu are fund guilty f vilating these standards, yu will be subject t certain penalties as utlined in the cllege judiciary prcedures. These penalties include permanent expulsin. Read the Academic Integrity Statement and then sign and date in the space belw. Yu are required t abide by these ethical standards while yu are a student. Yur signature indicates that yu understand the ethical standards expected f yu in this academic cmmunity, and that yu understand the cnsequences f vilating these standards. Curse & Semester Instructr Name Print Name Print Name Signature Date