Syllabus MIS496, IT Security Management Spring 2016 Instructor Information Bongsik Shin, Ph.D Office: SS-3118, Phone: 619-594-2133 Email: bshin@mail.sdsu.edu Office Hours: TTH 14:00~15:00 PM or by appointment Class Information Schedule #: 22166, Class hour: TH 16:00-18:40, Classroom: SS2512 GENERAL BSBA GOALS BSBA students will graduate being: Effective Communicators Critical Thinkers Able to Analyze Ethical Problems Global in their perspective Knowledgeable about the essentials of business COURSE OBJECTIVES/LEARNING OUTCOMES At the end of the course, students should achieve the following: Possess knowledge of various threat types. Understand methods of host, application, data, and network security. Describe various cryptography technologies. Explain various access control and identity management methods Discuss elements of risk mitigation and compliance Become familir in using various security tools to analyze data, network, and system threats and vulnerabilities Get familiar with the creation and usage of Virtual Machines Explain computer architecture and operating system, which are fundamental in growing knowledge of IT security COURSE DESIGN This course is intended to cover managerial and technical aspects of IT security. There is a large industry demand for seasoned IT security skills and it is definitely a perfect time to consider IT Security as a lifelong career path. IT security is a huge area in its scope. In this course, a comprehensive overview is offered on a large array of IT Security issues. To realize the learning outcomes, this course relies on various pedagogical approaches: reading assignments & quizzes, classroom lectures, classroom hands-on exercises, topic presentations and a group project. Each class session is divided into three parts: lecture (about an hour and 20 minutes), hands-on exercise (about an hour), and topic presentation (about 20 minutes). The class is designed that, at the end of the semester, students are encouraged to take the CompTIA Security+ certification test. Anyone who passes the 90 minute certification test before 5/13 will be given an A for the final grade. 1 BOOKS (REQUIRED) AND REFERENCES Security+ Guide to Network Security Fundamentals by Mark Ciampa (2015) There are useful Internet sources that can further strengthen learning. I will take full advantage of the following sources to supplement the textbook. Professor Messer http://www.professormesser.com YouTube http://www.youtube.com GENERAL CLASS POLICY Course information including the syllabus and exam/quiz scores will be updated on Blackboard. Students are required to check Blackboard regularly. Usage of a laptop computer is allowed only during the hands-on session. Students caught giving or receiving assistance to/from another student(s) during an exam will be asked to leave and will receive an F for the course. Every case will be reported to the Center for Student Rights and Responsibilities for a possible disciplinary action. Visit http://www.sa.sdsu.edu/srr/index.html for more information on academic dishonesty. PPT slides are designed to: (1) extract important concepts students are expected to understand; (2) define the scope of the two exams; and (3) extend the textbook coverage as needed. For efficient use of class time, the class lecture focuses on items that need further explanations, skipping those that can be understood through self-reading. If you are a student with a disability and believe you will need accommodations for this class, it is your responsibility to contact Student Disability Services at (619) 594-6473. To avoid any delay in the receipt of your accommodations, you should contact Student Disability Services as soon as possible. Please note that accommodations are not retroactive, and that I cannot provide accommodations based upon disability until I have received an accommodation letter from Student Disability Services. Your cooperation is appreciated. TESTS There are two non-cumulative exams: one mid-term and one final. All exams must be taken at their scheduled time and at the course venue. No early or late examinations unless a student experiences emergency. Test questions are drawn from lecture materials covered in classes, but not from hands-on exercises. There will be 50 multiple-choice questions in each exam and students are required to bring a Scantron (Form 882-E). Each test is 100 points. HANDS-ON EXERCISES The second part of each class is used for instructor-guided hands-on exercises. During the session, students are going to use their own laptop computer to do assigned exercises. All security programs “have to” run ONLY on the virtual machine to keep any unexpected mistakes from paralyzing your physical (or host) machine. For this, all students are required to install VirtualBox from Oracle and Windows client on top of VirtualBox (you need to save enough HD space). You should be able to download Windows from the MS Dreamspark account. 2 Just in case you are unable to ping from one VM to another VM, one possible solution is: go to "Control Panel\Network and Internet\Network and Sharing Center\Advanced sharing settings" and then turn on the "file and printer sharing" so that the ping packets can get through the firewall. TOPIC RESEARCH & PRESENTATION Two students forms a group and will be assigned a topic to be presented for up to 20 minutes. The group will also undertake a hands-on oriented semester project. 7-8 PPT well-designed slides (excluding the cover) are to be prepared and should be submitted to Turnitin for plagiarism checking and for distribution to other students. The PPT submission should be completed by Tuesday (2 days before the scheduled presentation) of the week to avoid penalty and to provide time for students/instructor to browse in advance. To receive a good score, each presenter should be thoroughly familiar with the subject and thus should effectively answer questions from students and the instructor. Also, please do not read a prepared script but explain the slides with your own language. Through topic presentations, more advanced IT security concepts, not covered by the textbook, are introduced to the class. The rubrics of written and oral communications will be used for grading. When your team submit group works (i.e., topic presentation and semester project) to Turnitin, please combine all materials into one file. Also please make sure that only one copy is submitted by a team member. Lastly the title section in Turnitin should clearly indicate the title of your presentation topic or group project. The grading of presentation will be withheld from viewing until all groups complete their presentations so that the instructor makes necessary adjustments based on the relative performance of all groups. It is very important that, as shown in the rubrics, a presenter become an effective oral and written communicator. INDIVIDUAL ASSIGNMENT There will be individual assignments on advanced subjects that are not covered during the regular class session due to time constraints. IT security is an extremely broad field with numerous topics to learn and balanced exposure to them will better prepare a student for a related career. Most of them are very important but less-technical and thus can be self-studied. In the beginning of each class, there will be a short quiz that tests completion of your homework assignment. There will be two short answer questions in each quiz, each question counting 5 points. The instructor will provide key terms that students should understand in preparing for the quiz. Both class lectures and homework assignments are designed to prepare students for the CompTIA Security+ certification exam. SEMESTER PROJECT Each group will conduct a semester project and present it for 30 minutes. The project is primarily software-usage related and designed to give students additional hands-on experience. Each group is going to choose a project from the list (see below), gets thoroughly competent in using it, and present it to the class. During the presentation, each group provides general introduction of software functions and guides the class for hands on exercise. For the hands-on each group should prepare a fairly detailed hands-on guide so that students can follow through the instructions. The PPT report is divided into two parts: (1) general introduction of 3 the project (up to 10 slides); and (2) hands-on instructions (unlimited). Again, the report and hands-on instructions should be submitted to Turnitin for plagiarism checking. In combining the group project report and hands on instructions, please do not zip them as Turnitin may not accept the file format. Students are responsible for preparing hard copies of the hands-on materials. Each group should email the instructor the software link. Many security tools are not stable and each group should thoroughly test the stability of software well in advance to confirm the viability of the assigned (or chosen) project. Once the project list is finalized, the instructor will decide the order of presentations in a random fashion. Please remember that one of the most important considerations of the final project performance is how you design the oral and written parts effectively to share your learned knowledge with students. Possible Semester Projects: o Password cracking (brute force and dictionary methods) and tools (e.g., John the Ripper, Cain and Abel, Hydra, cloudcracker.com o Session hijacking (e.g., MITM) with Ettercap o Survey of security tools from Microsoft (e.g., Malware Removal Starter Kit, MS Baseline Security Analyzer) o Snort: Open source intrusion detection system o Metasploit: Penetration testing o Nessus: Vulnerability Scanning o Threat Modeling and threat modeling tool (e.g., Microsoft) o Gathering hacking information using Google search engine o Gathering hacking information using SHODAN search engine o Using the Web (Sandbox) to identify malware (e.g., Anubis, GFI, Norman, Wepawet) o Open Source Intelligence Platform: Collaborative Research into Threats (CRITs) platform/Collective Intelligence Framework (CIF) o Hacking with the Zeus Trojan Malware PEER EVALUATIONS Given that there are only two students for a group, peer evaluations will be conducted in the form of in-person interviews if a student files a complaint of free riding (or similar). FINAL GRADING The final grade will be based on two in-class exams, quizzes, topic presentation, and a semester project. Their weights are shown below. Sources Midterm Final test Semester Project (Written) Semester project (Oral) Homework Assignment & Quizzes Topic Presentation (Written) Topic Presentation (Oral) Total Points 100 100 40 30 110 (approx.) 20 20 420 4 The following table summarizes the distribution of final grades. A AB+ B BC+ C CD+ D DF Final Grade Distribution 100 – 95.00 % 94.99 – 90.00 % 89.99 – 87.00 % 86.99 – 83.00 % 82.99 – 79.00 % 78.99 – 77.00 % 76.99 – 73.00 % 72.99 – 69.00 % 68.99 – 67.00 % 66.99 – 63.00 % 62.99 – 59.00 % 58.99 – 0.00 % The posting of final grades on the university system will be notified via email. Appeal for grading should be done within a week of the posted date. INDIVIDUAL ASSIGNMENT & QUIZ Assign #1: VM hands on: 1-3 & 1-4. Install Linux Mint (Tutorial 1) and go through three tutorials below. Submission requirement: A printed screenshot that shows VirtualBox and Linux VM https://www.youtube.com/watch?v=H_ustCy4Ks8 (22:33) https://www.youtube.com/watch?v=3hkSbafnWTs (16:07) https://www.youtube.com/watch?v=hXp8AdbLaFo (15:29) Assign #2: Fundamentals of how computers work (refreshing your knowledge). Introduction to Personal Computers (9:18; 9:51; and 6:52): 3 parts https://www.youtube.com/watch?v=ymsJyo1_6QM https://www.youtube.com/watch?v=zLRLraI0Y7M https://www.youtube.com/watch?v=4ULJYi4gnGU See how computers add numbers (14:26): https://www.youtube.com/watch?v=VBDoT8o4q00&list=PLekivpoaIPnAdg8QnM3wGYNUl7Quy3Aq How a CPU works (20:41): https://www.youtube.com/watch?v=cNN_tTXABUA&index=2&list=PLekivpoaIPnAdg8QnM3wGYNUl7Quy3Aq Assign #3: Fundamentals of how operating systems work Professor Messar (Part 1 only,8:20): http://www.professormesser.com/free-a-plus-training/220701/operating-systems/ OS Lecture 1(51:23): https://www.youtube.com/watch?v=55FeqGGzE5Q The remaining assignments are based on CompTIA Security+ Training Videos (Professor Messer) available at http://www.professormesser.com/security-plus/sy0-401/sy0-401-course-index/ 5 Assign #4: Section 2 – Compliance and Operational Security (2.1 & 2.2) Assign #5: Section 2 – Compliance and Operational Security (2.3 & 2.4) Assign #6: Section 2 – Compliance and Operational Security (2.5 & 2.6) Assign #7: Section 2 – Compliance and Operational Security (2.7, 2.8, and 2.9) Assign #8: Section 3 – Threat and Vulnerabilities (3.6, 3.7 & 3.8) Assign #9: Section 4 – Application, Data, and Host Security (4.1, 4.2 & 4.3) Assign #10: Section 4 – Application, Data, and Host Security (4.4 & 4.5) Assign #11: Section 5 – Threat and Vulnerabilities (5.1, 5.2 & 5.3) 6 TENTATIVE COURSE OUTLINE Date Topics (Subject to change) 1/21 Syllabus, Dreamspark 1/28 Intro. to Security (CH1) Classroom Hands-On (Subject to change) Assign #1 2-3, 2-4, and Case Project 2-6 3-1, 3-2, 3-3, 3-4, and 3-6 4-1, 4-2, 4-3 5-1, 5-2, 5-4, 5-5 6-1, 6-2, 6-3, 6-4 Assign #2 7-1, 7-2, 7-3, 7-4, 8-1, 8-4, 8-5, 8-6, 8-7 9-1, 9-2, 9-3, 9-4 Assign #6 11-1, 11-2, 11-3, 11-4 Assign #8 12-1, 12-2, 12-3, 12-4, 12-5, 12-6 13-1, 13-2, 13-3, 13-4, 13-5, 14-3 15-1, 15-2, 15-3, 15-4 Assign #9 1-1, 1-2, 2-1, 2-2 2/4 2/11 2/18 Malware and Social Engineering Attacks (CH2) Application and Network Attacks (CH3) Host, Application, & Data Security (CH4) 2/25 Basic Cryptography (CH5) 3/3 Mid-Term Exam Advanced Cryptography (CH6) Network Security Fundamentals (CH7) Administering a Secure Network (CH8) Administering a Secure Network (CH8) Wireless Network Security (CH9) Access Control Fundamentals (CH11) Project presentation 3/10 3/17 3/24 4/7 4/14 4/21 4/28 Homework Due Dates (10 points) Assign #3 Assign #4 Assign #5 Assign #7 Assign #10 Assign #11 Important Dates Topic Presentations Case selection - Project group formation Using Wireshark to detect network vulnerabilities Packet construction with Colasoft’s Packet Builder STIX (Structured Threat Information Expression) / TAXII (Trusted Automated Exchange of Indicator Information) Domain Shadowing DNS fast-flux attack Security Information and Event Management (SIEM) Email SW URL to instructor Tor Network and Browser Open Web Application Security Project (OWASP) Cybercrime/Criminal Web Portals Due: Project Report (PPT) 5/5 Project presentation 5/12 Final exam * Instructor reserves the rights to make any changes necessary. ** Students are responsible for staying updated on the changes. 7 CBA WRITTEN COMMUNICATIONS SKILLS RUBRIC Content (20 points) Organization (20 points) Below Expectations Does not adequately cover the assigned task. The primary thesis may not be clear or if it is, little topic development is evident. Assertions made in the writing are either weakly supported or no support is offered. Paper lacks logical sequence hence causing format to interfere with readability. Does not use proper paragraphing. Topic sentences do not lead to rest of paragraph or are missing altogether. Meets Expectations The assigned task is covered sufficiently. The primary thesis is clear but there is some room for further development of the topic. Support is offered for assertions that are made but that support could be stronger, more compelling or more inclusive of all issues. Paper follows logical sequence with identifiable beginning, development, and conclusion. Generally proper use of paragraph structure and topic sentences. Organization and/or headings help the reader to follow and find information. Exceeds Expectations The assigned task is thoroughly covered and completed. The primary thesis is clear and fully developed. Assertions made throughout the writing are compelling and clearly supported. Paper flows well with appropriate beginning, development, and conclusion. Paragraph structure contributes to flow and transitions. Organization and/or headings help the reader to understand and remember information. CBA ORAL COMMUNICATIONS SKILLS RUBRIC Voice Quality & Pace (15 points) Rapport with Audience & Use of Media (15 points) Below Expectations Mumbles, mispronounces words, grammatical errors, “umms”. Difficult to understand. Speaks too quietly or too loudly. Speaks too fast or too slow. Loses train of thought, tentative. Lacks enthusiasm. Mechanistic Does not connect with audience. Little to no eye contact. Reads. Relies heavily on slides and/or notes. Attempts to cover too many slides or lingers too long on too few slides. Meets Expectations Easily understood. Speaks loud enough to be heard and at appropriate pace. Some awkward pauses or halting delivery but mostly clear and natural. Could display greater enthusiasm, seem more genuinely interested in own presentation. Tries to maintain eye contact most of the time but instances may be fleeting in length. Scans the room. Some reliance on notes or slides. Exceeds Expectations Enthusiastic and engaging. Speaks clearly and loudly enough at a comfortable pace. Exudes confidence and interest. No grammatical or pronunciation errors. Presentation appears conversational, extemporaneous, and natural. Genuinely connects with audience. Maintains eye contact. Visuals (slides, etc.) effortlessly enhance speech. 8