Law and Social Control - Michigan State University

advertisement
CSE 429, CJ 429
Topics in CyberSecurity
Spring 2014
Class Meetings: All Online
Office Hours: Mondays 1-230pm (virtual meetings can also be held when needed)
Instructor: Dr. Thomas J. Holt
Office #: 517-353-9563
Office: Baker 434
E-mail: holtt@msu.edu
COURSE DESCRIPTION
In this course we will critically examine the challenge of cybercrime, terror, and warfare
and the techniques these groups apply to compromise computer systems and affect public
policy. The course is designed to be a roundtable discussion, meaning that you must be
prepared, do the readings, and be prepared for less structured lectures in favor of
conversations. We will focus primarily on computer hacking and network attacks, given
the prominence of hackers in the public eye and questions about the impact of technology
on security and public safety. This will help students understand the ways that societies
are structuring legal and military policies toward cyberspace, and the intersection of
criminality, extremism, and warfighting in on-line spaces. Discussions will center on the
history of hacking, attack methods used by various groups, the legal response, and the
difficulties in measuring and combating various forms of cyberattack. The development
of security technologies used to defend against these attacks, as well as the laws used to
investigate and prosecute these behaviors will be addressed as well.
Grade Breakdown
Exams 1 (Midterm)
One Small Paper
One Large Paper
Quizzes 1-7
Course Posts (1 per week, 16 total)
Total
50 points
20 points
40 points
5 points
2.5 points
50 points total
20 points total
40 points total
35 points total
40 points total
185 points total
4.0: 185-167
3.5: 166-158
3.0: 157-148
2.5: 147-139
2.0: 138-130
1.5: 129-121
1.0: 120-111
1
Exams
One exam will be given during the semester, counting for 50 points of the total semester
grade. This exam will serve as a sort of midterm, and includes multiple choice, true and
false questions, as well as several short answer/essay format questions. All students are
expected to take the exam during the scheduled period, from 8am 2/26 at 8am to 8pm
2/28. You must take the exam during this time, and you will have 120 minutes from the
time you begin the exam to complete it. Only approved excuses (hospitalizations,
imprisonment, documented deaths, etc.) will call for the administration of a make-up
exam, which will be entirely essay based. Students without an approved absence for any
scheduled exam will receive a 0 for that exam. NO EXCEPTIONS!
Quizzes
Seven five-point quizzes will be given, one each week of the semester, that will assess
your knowledge on a specific topic covered during that week. Quizzes will be available
for 48 hours beginning at 8 am on Thursday and ending at 8am on Saturday. No quiz
will be accepted after that point, nor enabled before that time. You will have 20 minutes
to complete each quiz, and after that time your quiz grade will be automatically
submitted. There will be no make-ups provided for quizzes under any circumstances as
you have ample time to arrange your schedule to accommodate a 20 minute quiz period
each week. It is your responsibility to complete the assignment in a timely fashion.
Course Posts
You are required to make AT LEAST ONE short post each week addressing a question
of interest that will be posted based on readings from the Adler and Adler Edited book.
You will have multiple readings for each week, and so you can select to post a comment
about at least one of those readings every week. You will have until Friday at 5pm to
provide your response. There will be no make-ups or late responses accepted as it is your
responsibility to provide a response in the time afforded.
Your response must be at least two full complete sentences, at least four lines in length
and give a thoughtful comment about any one of the readings, or to the comments of your
classmates. You must give substantive thought to the question demonstrating your ability
to synthesize class material.
Papers/Writing Assignments
You will also be expected to write one small four to six page paper, and one large paper
(15-25 pages) due at the end of the semester. For your small paper, you will be required
to research a specific attack tool or piece of malware designed to cause harm, damage,
espionage, or foster social unrest. Both class readings and outside sources must be
integrated.
For your large semester paper, you will also be tasked with the creation of an
“intelligence brief” based on the use of technology by military and civilians in one of the
2
following countries:
China
Turkey
India
Pakistan
Russia
Israel
France
North Korea
Iran
Egypt
United States
Mexico
Romania
Germany
Brazil
South Korea
United Kingdom
South Africa
Nigeria
Australia
Iraq
Afghanistan
Canada
Venezuela
United Arab Emirates
Ukraine
Japan
Italy
Please note, due to the volume of information available concerning China and
Russia it will be possible to have two presentations on these nations. One author
should take the military angle, the other the civilian.
Your goal in this paper is to outline the threat that this nation may pose for cybercrime
and cyberterror to its neighbors and the world in general. What are the most likely
targets for actors within these nations? What types of attacks are they likely to engage
in? How are they using technology? What is their overall use of technology? What is
the business climate like? Who are their allies? Enemies? What may be major
motivations for actors: money, status, power, religion, nationalism? What types of
attacks do they experience on a regular basis? If we were to predict what may happen in
the next year/five year window, what will they be up to? How might prospective victim
nations develop deterrent strategies to combat attacks from this target? Be creative in
your thinking, and in your research. Treat this as though you are writing for a government
agency to provide prospective policy implications for future dealings with this country.
For both documents, outside sources are welcomed to augment arguments from other
assigned readings. You will be required to submit your paper into a dropbox folder set up
on the angel page for this class. THIS MEANS NO E-MAIL COPIES WILL BE
ACCEPTED UNDER ANY CIRCUMSTANCES!!!!!! Before you turn in your papers
please take the following steps to ensure you get as many points as possible for the
assignment:
1. READ YOUR PAPER!!! It is vital that you take the time to read through the paper
and check that their ideas make sense and flow together properly. Your writing is a
reflection of your thoughts, so make them count.
2. SPELL CHECK YOUR PAPER USING WORD!!! THEN READ IT AGAIN AND
SPELL CHECK IT BY HAND!!!! Why you ask? teh moor misspellangs you have, teh
hard erit is to reed your work. Spellcheck does not identify when you have put in a
common misspelling like “too” when you mean “two”. Also, do not use contractions, as
they do not belong in a professional document. Ain’t nothing worse than a person who
don’t take the time to spell out two words.
3
3. MAKE SURE THAT YOU HAVE APPROPRIATELY CITED THE AUTHORS
THAT YOU REFERENCE!!!! Please quote an author if you feel their comments support
or refute an idea. Quote only when absolutely necessary, since it will make more sense if
you put it into your own words. However, if put an author’s ideas in your own words,
make sure you reference the author at the end of the sentence. You are to use APA
formatting only.
If you have any questions on citations, please contact me immediately. DO NOT WAIT.
IF YOU PLAGIARIZE, YOU WILL NOT GET ANY CREDIT FOR THE
ASSIGNMENT! Following these steps will increase your likelihood of success, so
please take the time to read, spell check, and proofread your documents.
Your grade for each paper will be based on content, organization, and
language/mechanics. The best papers will provide a substantive and relevant exploration
of the question, with good detail, written at a college level, using appropriate quotes and
citations to demonstrate points, and demonstrates a clear understanding of the topic in an
analytical and persuasive manner. These papers will also be clearly and logically
presented using good grammar and proper citations.
A NOTE ON DUE DATES
Assignments will be open for a short window in order to ensure that you are not cheating
or engaging in unacceptable behavior. DO NOT WAIT TO COMPLETE AN
ASSIGNMENT. Since this is an on-line course you are expected to stay on top of
assignments, and perform in accordance with all posted time limits and guidelines. If you
fail to properly budget your time or do not take the appropriate time to be in front of a
computer with Internet access during the window when projects must be submitted then
that is your responsibility. Since this is an on-line course you are required to diligently
read and analyze the materials. Keep this in mind throughout the semester- YOU EARN
WHAT YOU EARN.
Academic Dishonesty
Article 2.3.3 of the Academic Freedom Report states that "The student shares with the
faculty the responsibility for maintaining the integrity of scholarship, grades, and
professional standards." In addition, the (insert name of unit offering course) adheres to
the policies on academic honesty as specified in General Student Regulations 1.0,
Protection of Scholarship and Grades; the all-University Policy on Integrity of
Scholarship and Grades; and Ordinance 17.00, Examinations. (See Spartan Life: Student
Handbook and Resource Guide and/or the MSU Web site: www.msu.edu.) Therefore,
unless authorized by your instructor, you are expected to complete all course
assignments, including homework, lab work, quizzes, tests and exams, without assistance
from any source. You are expected to develop original work for this course; therefore,
you may not submit course work you completed for another course to satisfy the
requirements for this course. Also, you are not authorized to use the www.allmsu.com
Web site to complete any course work. Students who violate MSU academic integrity
4
rules may receive a penalty grade, including a failing grade on the assignment or in the
course. Contact me if you are unsure about the appropriateness of your course work.
(See also http://www.msu.edu/unit/ombud/dishonestyFAQ.html )
Disruptive Behavior
Article 2.3.5 of the Academic Freedom Report (AFR) for students at Michigan State
University states: "The student's behavior in the classroom shall be conducive to the
teaching and learning process for all concerned." Article 2.3.10 of the AFR states that
"The student has a right to scholarly relationships with faculty based on mutual trust and
civility." General Student Regulation 5.02 states: "No student shall . . . interfere with the
functions and services of the University (for example, but not limited to, classes . . .) such
that the function or service is obstructed or disrupted. Students whose conduct adversely
affects the learning environment in this classroom may be subject to disciplinary action
through the Student Faculty Judiciary process.
Accommodations for Students with Disabilities
Students with disabilities should contact the Resource Center for Persons with
Disabilities to establish reasonable accommodations. For an appointment with a disability
specialist, call 353-9642 (voice), 355-1293 (TTY), or visit MyProfile.rcpd.msu.edu.
A NOTE ON COMPUTER/TECHNOLOGY USE
Since this course focuses heavily on computers, I expect you to have rudimentary
computer skills. I understand that students may not be computer savvy, but I would
expect that you at least know how to access the Internet, check e-mail, and use word
processing software. I do not care if you are a Windows, Mac, or Linux user. Rather, I
just want you to be able to tell the difference between a mouse and mouse. If you do not
have this knowledge, then we will try to get it to you as quickly as possible.
I must require that you obtain and use your MSU e-mail account whenever you attempt to
e-mail me regarding the class. If you send me a message from any other type of account
(hotmail, yahoo, etc.), I cannot guarantee that I will obtain it or read it. As a result,
always e-mail me from a valid MSU account. Also, ALWAYS, ALWAYS, ALWAYS
provide your name in your message. I will not reply if there is no name attached to a
message. Please reference this course somewhere in the subject line of your e-mails as
well. Thank you for your cooperation in this matter.
General Advice
I expect that you will be able to handle the reading and assignment load. Your final
grade is dependent on your ability to retain information and apply what we learn. I will
not try to make the course difficult however you must put forth an appropriate amount of
effort. If you are not doing well or feel concerned about your scores, we can discuss
ways to reinforce your study habits. But in the end, you must put forth the effort to learn
the material. Do not assume that you can call or send me an e-mail at the end of the
5
semester and get your grade changed. YOU EARN WHAT YOU EARN, NO
EXCEPTIONS. Do not ask for extra points at the end of the semester, as this is a
violation of university policy and is not tolerated under any circumstances.
A Note on Evaluations
Michigan State University takes seriously the opinion of students in the evaluation of the
effectiveness of instruction, and has implemented the SIRS (Student Instructional Rating
System) process to gather student feedback. This course utilizes the “online SIRS”
system. You will receive an e-mail sometime during the last two weeks of class asking
you to fill out the SIRS online form at your convenience. Please note the final grade for
this course will not be accessible on STUINFO during the week following the submission
of grades for this course unless the SIRS online form has been filled out. You will have
the option on the online SIRS form to decline to participate in the evaluation of the
course – we hope, however, that you will be willing to give us your frank and
constructive feedback so that we may instruct students even better in the future.
REQUIRED READINGS
The readings from this course are drawn from numerous books and journal articles,
which will be posted on-line to the angel page for this course. Each has been selected for
content, quality, and appropriateness. In addition, the following three books are required
for the course:
Andress and Winterfeld, (2013). Cyber Warfare: Techniques, Tactics and Tools for
Security Practitioners. Syngress.
Holt, Thomas J. (2013). Crime Online, 2nd edition. Carolina Academic Press.
Rid, Thomas. (2013). Cyberwar will not take place. Hurst & Co.
COURSE SCHEDULE, WHICH IS SUBJECT TO CHANGE AT ANY TIME!!!!!!
Week 1
1/7
Week 2
1/14
Contextualizing Cybercrime, and Cyberterror
Andress and Winterfeld: Ch. 12
Holt: Ch. 1, 7
ADDITIONAL READINGS ON ANGEL
Differentiating Cyberwarfare From Cybercrime
Andress and Winterfeld: Ch. 1, 2, 4
Rid: Ch. 1
6
Week 3
1/21
Week 4
1/28
Week 5
2/4
Week 6
2/11
Week 7
2/18
Cyberspace, Critical Infrastructure, and the Field
Andress and Winterfeld: Ch. 3, 7
Holt: Ch. 8, 10
The Characteristics of Hackers and Attackers
Andress and Winterfeld: Ch 5
Holt, Ch. 2
Additional Required Readings Posted on Angel
Paper 1 Due 2/4
Malware Use and Creation
Andress and Winterfeld: Ch. 6
Rid: Ch. 2, 3
ADDITIONAL READINGS POSTED ON ANGEL
Social Engineering and Social Media
Andress and Winterfeld: Ch 8
Holt: Ch. 4
Rid: Ch. 5
ADDITIONAL READINGS POSTED ON ANGEL
Intelligence and Counter-Network Exploitation
Andress and Winterfeld: Ch 9
Rid: Ch. 6
ADDITIONAL READINGS POSTED ON ANGEL
Week 8
2/25
Midterm Exam Will Be Opened 2/26 at 8am and close at 8pm 2/28
Week 9
3/4
Spring Break-No Classes
Week 10
3/11
Network Attack and Defense
Andress and Winterfeld: Ch. 10, 11
Rid: Ch. 4
ADDITIONAL READINGS POSTED ON ANGEL
7
Week 11
3/18
Week 12
3/25
Week 13
4/1
Week 14
4/8
Week 14
4/15
Policy Reactions to Cybercrime and Cyberwar
Andress and Winterfeld: Ch. 13, 14
Holt: Ch. 3
Rid: Ch. 7
Additional Required Readings Posted on Blackboard
Rethinking Cyberattack Policies
Andress and Winterfeld: Ch. 3, 13
Additional Required Readings Posted on Blackboard
Rethinking Cyberattackers and Cyberthreats
Andress and Winterfeld: Ch. 5
Additional Required Readings Posted on Blackboard
Assessing the Future of Cyberwar and Cybercrime
Andress and Winterfeld: Ch. 16
Rid: Ch. 8
Additional Required Readings Posted on Blackboard
Global Roundup and Threatdown
You will be required to write a brief description (1-2 paragraphs) of your
country findings on blackboard and respond to others to consider the state
of the globe.
Additional Required Readings Posted on Blackboard
Week 15
Final Research Papers Must Be Submitted Friday 4/25 at 5pm
8
Download