CSC4003 Computer Information Security

Upcoming Events:

2016 Central Ohio Information Security Summit March 29 - 30, 2016 in Columbus OH

2016 Cyber Auto Challenge July 25 - 29, 2016 in Warren, MI

Central Ohio InfoSec Organizations:

Central Ohio ISSA

Central Ohio ISACA

Central Ohio Infragard

Date Audio Recording Slides Handouts Lab Assignment Homework Assignment
1-11-2016 1/11/16 audio 1/11/16 Powerpoint

Syllabus

   
1-13-2016 Security1-13-16.m4a 1/13/16 Powerpoint   Lab 1  
1-18-2016 Security_1-18-16.m4a 1/18/16 Powerpoint      
1-20-2016 Security_1-20-16.mp3 1/20/16 Powerpoint  

Lab 1 due (4:30 p.m.)

Lab_2 Assigned

NOTE: Lab 2: IIS and SQL Server VMs need to be members of the domain.

 
1-25-2016 Security_1-25-16.m4a 1/25/16 Powerpoint      
1-27-2016 Security_1-27-16.mp3 1/27/16 Powerpoint      
2-1-2016 Security_2116.mp3 2/1/16 Powerpoint   Final Presentation Topic Due @ 11:59 p.m.  
2-3-2016 Security_2-03-16.mp3 2/3/16 Powerpoint

Azure notes:

1) Use Standard versions of SQL Server and Windows to reduce the monthly cost

2) Set DNS to the IP address of the domain controller for the web and database servers.

- This can be set where you set the IP address of the servers.

3) All virtual machines need to be in the same resource group so that they can all talk together.

Lab 3 Assigned

 
2-8-2016 2-8-16.m4a 2/8/16 Powerpoint      
2-10-2016 Security_2-10-16.mp3 2/10/16 Powerpoint  

Lab 2 & 3 due (4:30 p.m.)

Lab 4 Assigned

Thycotic Install

No homework due
2-15-2016 Security_21516.mp3 2/15/16 Powerpoint     Homework due for 2/15/2016 at 4:30 p.m. (this replaces the textbook homework due): Select a recent news article related to today's reading topic (make sure you read the text as well). The topic can be on vulnerability management/scanning and/or penetration testing. Alternatively, if you do not find an article on the topic, attempt to research companies who perform penetration testing to help companies better secure their network. What considerations should be considered when determining who to hire to perform a penetration testing on a company? Write a 1/2 page to 1 page write-up on what you learned from the news article/research. Be specific on what you learned. Make sure to spell check/grammar check your work.
2-17-2016 Security_2-17-16.mp3 2/17/16 Powerpoint     No Homework Due
2-22-2016 Security_22216.mp3 2/22/16 Powerpoint     Find an article related to Botnets that goes beyond the text reading. Write a short 1/2 - 1 page summary with the reference on what you learned (you do not have to repeat the article contents). Be specific. Make sure to spell check/grammar check your work. This homework is due by 4:30 p.m. on 2/22/16. The summary can be e-mailed to me or printed off and turned in at the beginning of class.
2-24-2016   Mid-Term Exam   Lab 4 Due (4:30 p.m.) No Homework Due
3-14-2016 Security_31416.mp3 3/14/16 Powerpoint [Rounded Pi Day!]

Lab 5 assigned

Based upon the Mandiant APT1 Report and the Cyber Warfare chapter reading, write a short 1/2 - 1 page summary on what you learned (you do not have to repeat the Mandiant or textbook contents). Be specific. Make sure to spell check/grammar check your work. This homework is due by 4:30 p.m. on 3/14/16. The summary can be e-mailed to me or printed off and turned in at the beginning of class.
3-16-2016 Security_03-16-16.mp3 3/16/16 Powerpoint      
3-21-2016   3/21/16 Powerpoint     Data breaches often times result in litigation because harm was caused to individuals (identity theft, insurance fraud, etc.). Research different data breaches that have occurred and write a 1/2 - 1 page summary on what you learn regarding litigation that has resulted from the data breaches. Make sure to spell check/grammar check your work. The homework is due by 4:30 p.m. on 3/21/16. The summary can be e-mailed to me or printed off and turned in at the beginning of class.
3-23-2016 Security_03-23-16.mp3 3/23/16 Powerpoint      
3-28-2016 Security_03-28-16.mp3 3/28/16 Powerpoint Mid-term half credit opportunity due @ 4:30 p.m. See link below.   Managing organizational information security risk is generally not a small task. Risk Management involves lots of moving parts since change is always occurring within an organization. Research different Governance, Risk, and Compliance software packages that are available to document and manage risks. Write a 1/2 - 1 page summary on what you learn about these products. Make sure to spell check/grammar check your work. The homework is due by 4:30 p.m. on 3/21/16. The summary can be e-mailed to me or printed off and turned in at the beginning of class.
3-30-2016 Security_33016.mp3 3/30/16 Powerpoint  

Lab 5 due @ 4:30 p.m.

Lab 6 assigned

 
4-4-2016 Security_4416.mp3 4/4/16 Powerpoint

Financial Institution DDoS Presentation #1

Financial Institution DDoS Presentation #2

  For this homework, research various ways to create an executive dashboard. Remember our discussion in class about what preferences executives have. Create an executive dashboard to report MVNU's information security program status. Your dashboard should include metrics for Patch Management, Vulnerability Management, etc. Be creative! E-mail or print off a 1 page information security executive dashboard. This is due by 4:30 p.m. on 4/4/2016.
4-6-2016 Security_4616.mp3 4/6/16 Powerpoint

Data_Encryption_at_the_OSI_Layers Presentation

Secure_Code_Scanning Presentation

   
4-11-2016    

E-voting Presentation

Vulnerability Management Circus

Forensic Malware

Password Manager Product Comparison

CyberSecurity Legislation

  One area that we did not cover in class was supply-chain risk. The problem here is that companies tend to buy commodity IT equipment, but this comes at a risk because the assumption is that the supply-chain for system components is trustworthy. Research more about component/system supply chain risks. Write a 1/2 - 1 page summary of what you learn. Reference all articles used in your research. You can e-mail the questions to me or print them off and turn them in to me at the beginning of class.
4-13-2016    

Patient Privacy in Healthcare

Malware Forensics

Financial DDoS Presentation

Secure Code Scanners

Automobile Security

   
4-18-2016    

Automobile Security 1

Automobile Security 2

Automobile Security 3

Forensic Malware

Automobile Security 4

   
4-20-2016   4 20 16 Powerpoint     During the course of this class, a lot of material has been covered. E-mail me 5 questions that you may ask the panelists on 4-25-2016. The questions are due at the beginning of class on 4-20-2016. You can e-mail the questions to me or print them off and turn them in to me at the beginning of class.
4-25-2016 Security_Panel_4-25-16.mp3

Panel Discussion featuring:

Mr. Richard Bird, VP, IT Risk Director at Huntington National Bank

Mr. Guillermo Mateo, Manager, IT Security and Compliance at Worthington Industries

(Class will meet in JTTR 133)

    Expectation: Ask the panelists at least one of your questions that you documented in your homework for 4-20-2016. Make sure to cover something that you are interested in learning more about or that needs further expansion upon from our class discussions. Asking a question of the panelists will count toward your class discussion grade for the course. If you do not ask a question then you will not receive full credit for the class discussion.
4-29-2016   Final Exam 10 a.m. - 11:50 a.m.   Lab 6 due @ 10 a.m.  

Mid-term half credit opportunity

Final Presentation Grading Guidance

Final Presentation Topics and Schedule

Grading Scale

A 95-100
A- 90-94
B+ 86-89
B 82-85
B- 78-81
C+ 74-77
C 70-73
C- 67-69
D 60-66
F 0-59
Topic attachments
I Attachment Action Size Date Who Comment
Pptxpptx 1_Patient_Privacy_in_Healthcare.pptx manage 961.2 K 2016-04-16 - 00:56 MarkEarly  
Pptxpptx 1_auto_security_presentation.pptx manage 920.9 K 2016-04-19 - 01:13 MarkEarly  
Pptxpptx 2_Automobile_Cybersecurity.pptx manage 2348.2 K 2016-04-19 - 01:13 MarkEarly  
Pptxpptx 2_Malware_Forensics.pptx manage 466.7 K 2016-04-16 - 00:57 MarkEarly  
Pptxpptx 3_Automobile_Cybersecurity.pptx manage 3017.5 K 2016-04-19 - 01:13 MarkEarly  
Pptxpptx 3_Financial_DDoS_Presentation.pptx manage 5289.3 K 2016-04-16 - 00:57 MarkEarly  
Pptxpptx 4_Security_Presentation.pptx manage 518.9 K 2016-04-16 - 00:57 MarkEarly  
Pptxpptx 4_forensic_malware_sec_pp.pptx manage 5750.1 K 2016-04-19 - 01:13 MarkEarly  
Pptxpptx 5_AutoSecurity.pptx manage 193.6 K 2016-04-19 - 01:13 MarkEarly  
Pptxpptx 5_Automobile_Cybersecurity.pptx manage 22720.8 K 2016-04-19 - 02:19 MarkEarly  
Pptxpptx CSC4003_-_1_18_16.pptx manage 1395.3 K 2016-01-17 - 19:19 MarkEarly  
Pptxpptx CSC4003_-_1_20_16.pptx manage 1694.5 K 2016-01-17 - 19:19 MarkEarly  
Pptxpptx CSC4003_-_1_25_16.pptx manage 1605.7 K 2016-01-24 - 18:37 MarkEarly  
Pptxpptx CSC4003_-_1_27_16.pptx manage 947.0 K 2016-01-29 - 02:39 MarkEarly  
Pptxpptx CSC4003_-_2_10_16.pptx manage 2328.5 K 2016-02-07 - 18:52 MarkEarly  
Pptxpptx CSC4003_-_2_15_16.pptx manage 3724.1 K 2016-02-14 - 19:46 MarkEarly  
Pptxpptx CSC4003_-_2_17_16.pptx manage 1209.6 K 2016-02-17 - 21:29 MarkEarly  
Pptxpptx CSC4003_-_2_1_16.pptx manage 2648.3 K 2016-01-30 - 16:50 MarkEarly  
Pptxpptx CSC4003_-_2_22_16.pptx manage 4267.6 K 2016-02-22 - 02:11 MarkEarly  
Pptxpptx CSC4003_-_2_3_16.pptx manage 1240.1 K 2016-01-30 - 19:22 MarkEarly  
Pptxpptx CSC4003_-_2_8_16.pptx manage 7807.0 K 2016-02-07 - 18:50 MarkEarly  
Pptxpptx CSC4003_-_3_14_16.pptx manage 1398.6 K 2016-03-13 - 20:25 MarkEarly  
Pptxpptx CSC4003_-_3_16_16.pptx manage 7078.9 K 2016-03-13 - 20:26 MarkEarly  
Pptxpptx CSC4003_-_3_21_16.pptx manage 2019.2 K 2016-03-21 - 00:53 MarkEarly  
Pptxpptx CSC4003_-_3_23_16.pptx manage 2382.1 K 2016-03-21 - 00:45 MarkEarly  
Pptxpptx CSC4003_-_3_28_16.pptx manage 3066.3 K 2016-03-28 - 00:25 MarkEarly  
Pptxpptx CSC4003_-_3_30_16.pptx manage 1825.7 K 2016-03-30 - 20:24 MarkEarly  
Pptxpptx CSC4003_-_4_20_16.pptx manage 1277.5 K 2016-04-20 - 01:54 MarkEarly  
Pptxpptx CSC4003_-_4_4_16.pptx manage 2084.9 K 2016-04-03 - 21:13 MarkEarly  
Pptxpptx CSC4003_-_4_6_16.pptx manage 1252.0 K 2016-04-03 - 23:58 MarkEarly  
Pptxpptx Cyber_Security_Legislation.pptx manage 504.2 K 2016-04-12 - 01:46 MarkEarly  
Pptxpptx Data_Encryption_at_the_OSI_Layers.pptx manage 69.7 K 2016-04-10 - 00:14 MarkEarly  
Pptxpptx E-voting-_Internet_voting_Original.pptx manage 2055.6 K 2016-04-12 - 00:40 MarkEarly  
Docxdocx Final_Presentation_Grading_Guidance.docx manage 14.8 K 2016-03-14 - 01:52 MarkEarly  
Docxdocx Final_Presentation_Topics.docx manage 13.5 K 2016-02-07 - 18:55 MarkEarly  
Pptxpptx FinancialInstitutionDDoSPresentation.pptx manage 1512.7 K 2016-04-10 - 00:22 MarkEarly  
Pptxpptx FinancialInstitutionDDoSPresentation2.pptx manage 3075.0 K 2016-04-10 - 00:31 MarkEarly  
Pptxpptx Forensic_Malware.pptx manage 1309.5 K 2016-04-12 - 00:40 MarkEarly  
Docxdocx Lab_2.docx manage 16.1 K 2016-01-20 - 01:29 MarkEarly  
Docxdocx Lab_3.docx manage 16.0 K 2016-02-02 - 01:59 MarkEarly  
Docxdocx Lab_4.docx manage 223.9 K 2016-02-11 - 02:23 MarkEarly  
Docxdocx Lab_5.docx manage 23.5 K 2016-03-15 - 01:36 MarkEarly  
Docxdocx Lab_6.docx manage 129.7 K 2016-03-23 - 01:13 MarkEarly  
Docxdocx Mid-term_half_credit_opportunity.docx manage 12.9 K 2016-03-15 - 01:31 MarkEarly  
Pptxpptx Password_Mgrs.pptx manage 2227.7 K 2016-04-12 - 00:41 MarkEarly  
Pptxpptx Secure_Code_Scanning.pptx manage 3397.1 K 2016-04-10 - 00:13 MarkEarly  
Mp3mp3 Security_03-16-16.mp3 manage 174873.8 K 2016-03-18 - 00:29 BenjaminKindle  
Mp3mp3 Security_03-28-16.mp3 manage 173964.4 K 2016-04-08 - 13:25 BenjaminKindle  
M4am4a Security_1-18-16.m4a manage 146165.7 K 2016-01-19 - 00:09 BenjaminKindle  
M4am4a Security_1-25-16.m4a manage 105529.0 K 2016-01-26 - 03:14 BenjaminKindle  
Mp3mp3 Security_2-10-16.mp3 manage 184192.5 K 2016-02-12 - 18:06 BenjaminKindle  
Mp3mp3 Security_33016.mp3 manage 149640.0 K 2016-04-01 - 00:13 BenjaminKindle  
Mp3mp3 Security_4416.mp3 manage 203442.2 K 2016-04-08 - 13:30 BenjaminKindle  
Mp3mp3 Security_4616.mp3 manage 203742.2 K 2016-04-08 - 13:41 BenjaminKindle  
Mp3mp3 Security_Panel_4-25-16.mp3 manage 191565.0 K 2016-04-26 - 00:36 BenjaminKindle  
Pptxpptx Vuln_Mgmt_Circus.pptx manage 128.5 K 2016-04-12 - 00:41 MarkEarly  
Exeexe setup.exe manage 67337.2 K 2016-02-10 - 21:31 MarkEarly  
Topic revision: r65 - 2016-04-26 - BenjaminKindle
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback