CSE 429, CJ 429 Topics in CyberSecurity Spring 2014 Class Meetings: All Online Office Hours: Mondays 1-230pm (virtual meetings can also be held when needed) Instructor: Dr. Thomas J. Holt Office #: 517-353-9563 Office: Baker 434 E-mail: holtt@msu.edu COURSE DESCRIPTION In this course we will critically examine the challenge of cybercrime, terror, and warfare and the techniques these groups apply to compromise computer systems and affect public policy. The course is designed to be a roundtable discussion, meaning that you must be prepared, do the readings, and be prepared for less structured lectures in favor of conversations. We will focus primarily on computer hacking and network attacks, given the prominence of hackers in the public eye and questions about the impact of technology on security and public safety. This will help students understand the ways that societies are structuring legal and military policies toward cyberspace, and the intersection of criminality, extremism, and warfighting in on-line spaces. Discussions will center on the history of hacking, attack methods used by various groups, the legal response, and the difficulties in measuring and combating various forms of cyberattack. The development of security technologies used to defend against these attacks, as well as the laws used to investigate and prosecute these behaviors will be addressed as well. Grade Breakdown Exams 1 (Midterm) One Small Paper One Large Paper Quizzes 1-7 Course Posts (1 per week, 16 total) Total 50 points 20 points 40 points 5 points 2.5 points 50 points total 20 points total 40 points total 35 points total 40 points total 185 points total 4.0: 185-167 3.5: 166-158 3.0: 157-148 2.5: 147-139 2.0: 138-130 1.5: 129-121 1.0: 120-111 1 Exams One exam will be given during the semester, counting for 50 points of the total semester grade. This exam will serve as a sort of midterm, and includes multiple choice, true and false questions, as well as several short answer/essay format questions. All students are expected to take the exam during the scheduled period, from 8am 2/26 at 8am to 8pm 2/28. You must take the exam during this time, and you will have 120 minutes from the time you begin the exam to complete it. Only approved excuses (hospitalizations, imprisonment, documented deaths, etc.) will call for the administration of a make-up exam, which will be entirely essay based. Students without an approved absence for any scheduled exam will receive a 0 for that exam. NO EXCEPTIONS! Quizzes Seven five-point quizzes will be given, one each week of the semester, that will assess your knowledge on a specific topic covered during that week. Quizzes will be available for 48 hours beginning at 8 am on Thursday and ending at 8am on Saturday. No quiz will be accepted after that point, nor enabled before that time. You will have 20 minutes to complete each quiz, and after that time your quiz grade will be automatically submitted. There will be no make-ups provided for quizzes under any circumstances as you have ample time to arrange your schedule to accommodate a 20 minute quiz period each week. It is your responsibility to complete the assignment in a timely fashion. Course Posts You are required to make AT LEAST ONE short post each week addressing a question of interest that will be posted based on readings from the Adler and Adler Edited book. You will have multiple readings for each week, and so you can select to post a comment about at least one of those readings every week. You will have until Friday at 5pm to provide your response. There will be no make-ups or late responses accepted as it is your responsibility to provide a response in the time afforded. Your response must be at least two full complete sentences, at least four lines in length and give a thoughtful comment about any one of the readings, or to the comments of your classmates. You must give substantive thought to the question demonstrating your ability to synthesize class material. Papers/Writing Assignments You will also be expected to write one small four to six page paper, and one large paper (15-25 pages) due at the end of the semester. For your small paper, you will be required to research a specific attack tool or piece of malware designed to cause harm, damage, espionage, or foster social unrest. Both class readings and outside sources must be integrated. For your large semester paper, you will also be tasked with the creation of an “intelligence brief” based on the use of technology by military and civilians in one of the 2 following countries: China Turkey India Pakistan Russia Israel France North Korea Iran Egypt United States Mexico Romania Germany Brazil South Korea United Kingdom South Africa Nigeria Australia Iraq Afghanistan Canada Venezuela United Arab Emirates Ukraine Japan Italy Please note, due to the volume of information available concerning China and Russia it will be possible to have two presentations on these nations. One author should take the military angle, the other the civilian. Your goal in this paper is to outline the threat that this nation may pose for cybercrime and cyberterror to its neighbors and the world in general. What are the most likely targets for actors within these nations? What types of attacks are they likely to engage in? How are they using technology? What is their overall use of technology? What is the business climate like? Who are their allies? Enemies? What may be major motivations for actors: money, status, power, religion, nationalism? What types of attacks do they experience on a regular basis? If we were to predict what may happen in the next year/five year window, what will they be up to? How might prospective victim nations develop deterrent strategies to combat attacks from this target? Be creative in your thinking, and in your research. Treat this as though you are writing for a government agency to provide prospective policy implications for future dealings with this country. For both documents, outside sources are welcomed to augment arguments from other assigned readings. You will be required to submit your paper into a dropbox folder set up on the angel page for this class. THIS MEANS NO E-MAIL COPIES WILL BE ACCEPTED UNDER ANY CIRCUMSTANCES!!!!!! Before you turn in your papers please take the following steps to ensure you get as many points as possible for the assignment: 1. READ YOUR PAPER!!! It is vital that you take the time to read through the paper and check that their ideas make sense and flow together properly. Your writing is a reflection of your thoughts, so make them count. 2. SPELL CHECK YOUR PAPER USING WORD!!! THEN READ IT AGAIN AND SPELL CHECK IT BY HAND!!!! Why you ask? teh moor misspellangs you have, teh hard erit is to reed your work. Spellcheck does not identify when you have put in a common misspelling like “too” when you mean “two”. Also, do not use contractions, as they do not belong in a professional document. Ain’t nothing worse than a person who don’t take the time to spell out two words. 3 3. MAKE SURE THAT YOU HAVE APPROPRIATELY CITED THE AUTHORS THAT YOU REFERENCE!!!! Please quote an author if you feel their comments support or refute an idea. Quote only when absolutely necessary, since it will make more sense if you put it into your own words. However, if put an author’s ideas in your own words, make sure you reference the author at the end of the sentence. You are to use APA formatting only. If you have any questions on citations, please contact me immediately. DO NOT WAIT. IF YOU PLAGIARIZE, YOU WILL NOT GET ANY CREDIT FOR THE ASSIGNMENT! Following these steps will increase your likelihood of success, so please take the time to read, spell check, and proofread your documents. Your grade for each paper will be based on content, organization, and language/mechanics. The best papers will provide a substantive and relevant exploration of the question, with good detail, written at a college level, using appropriate quotes and citations to demonstrate points, and demonstrates a clear understanding of the topic in an analytical and persuasive manner. These papers will also be clearly and logically presented using good grammar and proper citations. A NOTE ON DUE DATES Assignments will be open for a short window in order to ensure that you are not cheating or engaging in unacceptable behavior. DO NOT WAIT TO COMPLETE AN ASSIGNMENT. Since this is an on-line course you are expected to stay on top of assignments, and perform in accordance with all posted time limits and guidelines. If you fail to properly budget your time or do not take the appropriate time to be in front of a computer with Internet access during the window when projects must be submitted then that is your responsibility. Since this is an on-line course you are required to diligently read and analyze the materials. Keep this in mind throughout the semester- YOU EARN WHAT YOU EARN. Academic Dishonesty Article 2.3.3 of the Academic Freedom Report states that "The student shares with the faculty the responsibility for maintaining the integrity of scholarship, grades, and professional standards." In addition, the (insert name of unit offering course) adheres to the policies on academic honesty as specified in General Student Regulations 1.0, Protection of Scholarship and Grades; the all-University Policy on Integrity of Scholarship and Grades; and Ordinance 17.00, Examinations. (See Spartan Life: Student Handbook and Resource Guide and/or the MSU Web site: www.msu.edu.) Therefore, unless authorized by your instructor, you are expected to complete all course assignments, including homework, lab work, quizzes, tests and exams, without assistance from any source. You are expected to develop original work for this course; therefore, you may not submit course work you completed for another course to satisfy the requirements for this course. Also, you are not authorized to use the www.allmsu.com Web site to complete any course work. Students who violate MSU academic integrity 4 rules may receive a penalty grade, including a failing grade on the assignment or in the course. Contact me if you are unsure about the appropriateness of your course work. (See also http://www.msu.edu/unit/ombud/dishonestyFAQ.html ) Disruptive Behavior Article 2.3.5 of the Academic Freedom Report (AFR) for students at Michigan State University states: "The student's behavior in the classroom shall be conducive to the teaching and learning process for all concerned." Article 2.3.10 of the AFR states that "The student has a right to scholarly relationships with faculty based on mutual trust and civility." General Student Regulation 5.02 states: "No student shall . . . interfere with the functions and services of the University (for example, but not limited to, classes . . .) such that the function or service is obstructed or disrupted. Students whose conduct adversely affects the learning environment in this classroom may be subject to disciplinary action through the Student Faculty Judiciary process. Accommodations for Students with Disabilities Students with disabilities should contact the Resource Center for Persons with Disabilities to establish reasonable accommodations. For an appointment with a disability specialist, call 353-9642 (voice), 355-1293 (TTY), or visit MyProfile.rcpd.msu.edu. A NOTE ON COMPUTER/TECHNOLOGY USE Since this course focuses heavily on computers, I expect you to have rudimentary computer skills. I understand that students may not be computer savvy, but I would expect that you at least know how to access the Internet, check e-mail, and use word processing software. I do not care if you are a Windows, Mac, or Linux user. Rather, I just want you to be able to tell the difference between a mouse and mouse. If you do not have this knowledge, then we will try to get it to you as quickly as possible. I must require that you obtain and use your MSU e-mail account whenever you attempt to e-mail me regarding the class. If you send me a message from any other type of account (hotmail, yahoo, etc.), I cannot guarantee that I will obtain it or read it. As a result, always e-mail me from a valid MSU account. Also, ALWAYS, ALWAYS, ALWAYS provide your name in your message. I will not reply if there is no name attached to a message. Please reference this course somewhere in the subject line of your e-mails as well. Thank you for your cooperation in this matter. General Advice I expect that you will be able to handle the reading and assignment load. Your final grade is dependent on your ability to retain information and apply what we learn. I will not try to make the course difficult however you must put forth an appropriate amount of effort. If you are not doing well or feel concerned about your scores, we can discuss ways to reinforce your study habits. But in the end, you must put forth the effort to learn the material. Do not assume that you can call or send me an e-mail at the end of the 5 semester and get your grade changed. YOU EARN WHAT YOU EARN, NO EXCEPTIONS. Do not ask for extra points at the end of the semester, as this is a violation of university policy and is not tolerated under any circumstances. A Note on Evaluations Michigan State University takes seriously the opinion of students in the evaluation of the effectiveness of instruction, and has implemented the SIRS (Student Instructional Rating System) process to gather student feedback. This course utilizes the “online SIRS” system. You will receive an e-mail sometime during the last two weeks of class asking you to fill out the SIRS online form at your convenience. Please note the final grade for this course will not be accessible on STUINFO during the week following the submission of grades for this course unless the SIRS online form has been filled out. You will have the option on the online SIRS form to decline to participate in the evaluation of the course – we hope, however, that you will be willing to give us your frank and constructive feedback so that we may instruct students even better in the future. REQUIRED READINGS The readings from this course are drawn from numerous books and journal articles, which will be posted on-line to the angel page for this course. Each has been selected for content, quality, and appropriateness. In addition, the following three books are required for the course: Andress and Winterfeld, (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress. Holt, Thomas J. (2013). Crime Online, 2nd edition. Carolina Academic Press. Rid, Thomas. (2013). Cyberwar will not take place. Hurst & Co. COURSE SCHEDULE, WHICH IS SUBJECT TO CHANGE AT ANY TIME!!!!!! Week 1 1/7 Week 2 1/14 Contextualizing Cybercrime, and Cyberterror Andress and Winterfeld: Ch. 12 Holt: Ch. 1, 7 ADDITIONAL READINGS ON ANGEL Differentiating Cyberwarfare From Cybercrime Andress and Winterfeld: Ch. 1, 2, 4 Rid: Ch. 1 6 Week 3 1/21 Week 4 1/28 Week 5 2/4 Week 6 2/11 Week 7 2/18 Cyberspace, Critical Infrastructure, and the Field Andress and Winterfeld: Ch. 3, 7 Holt: Ch. 8, 10 The Characteristics of Hackers and Attackers Andress and Winterfeld: Ch 5 Holt, Ch. 2 Additional Required Readings Posted on Angel Paper 1 Due 2/4 Malware Use and Creation Andress and Winterfeld: Ch. 6 Rid: Ch. 2, 3 ADDITIONAL READINGS POSTED ON ANGEL Social Engineering and Social Media Andress and Winterfeld: Ch 8 Holt: Ch. 4 Rid: Ch. 5 ADDITIONAL READINGS POSTED ON ANGEL Intelligence and Counter-Network Exploitation Andress and Winterfeld: Ch 9 Rid: Ch. 6 ADDITIONAL READINGS POSTED ON ANGEL Week 8 2/25 Midterm Exam Will Be Opened 2/26 at 8am and close at 8pm 2/28 Week 9 3/4 Spring Break-No Classes Week 10 3/11 Network Attack and Defense Andress and Winterfeld: Ch. 10, 11 Rid: Ch. 4 ADDITIONAL READINGS POSTED ON ANGEL 7 Week 11 3/18 Week 12 3/25 Week 13 4/1 Week 14 4/8 Week 14 4/15 Policy Reactions to Cybercrime and Cyberwar Andress and Winterfeld: Ch. 13, 14 Holt: Ch. 3 Rid: Ch. 7 Additional Required Readings Posted on Blackboard Rethinking Cyberattack Policies Andress and Winterfeld: Ch. 3, 13 Additional Required Readings Posted on Blackboard Rethinking Cyberattackers and Cyberthreats Andress and Winterfeld: Ch. 5 Additional Required Readings Posted on Blackboard Assessing the Future of Cyberwar and Cybercrime Andress and Winterfeld: Ch. 16 Rid: Ch. 8 Additional Required Readings Posted on Blackboard Global Roundup and Threatdown You will be required to write a brief description (1-2 paragraphs) of your country findings on blackboard and respond to others to consider the state of the globe. Additional Required Readings Posted on Blackboard Week 15 Final Research Papers Must Be Submitted Friday 4/25 at 5pm 8