Quizzes Folder

advertisement
Course Management
and Policies
Chao-Hsien Chu, Ph.D.
College of Information Sciences and Technology
The Pennsylvania State University
University Park, PA 16802
IST 515
Angel Site – IST 515
Instruction
• Welcome letter
• Course contents and
Syllabus
• Post questions
• Collaboration, record
and post presentation
• Reading materials
Angel Site – IST 515
Instruction
• Hands-on labs folder
• Discussion activities
folder
• Software and tools
• Quiz folder
• Term project folder
Adobe Connect Folder
For team collaboration
Reading Folder
Materials common to all
topics such as NIST 800
special series.
Materials specifically
for each topic.
Common Materials
Readings for Topic 1
Here are the readings
for topic 1 about the
course
Hands-on Labs Folder
• Lab User Guide
• About the Lab Slide
Lab Folder
Discussion Activities
Please check
syllabus for due
date!
Quizzes Folder
The quiz can be found in the Angel site under the
“Quizzes” folder. The quiz will be available when they
are assigned.
The quiz will
be available
when they
are assigned.
Communicate
For team work
Syllabus
( Please refer to online or paper copy for reference )
Course Uniqueness
This course covers conceptual, methodological, and
practical foundations of information security and
assurance, dividing into two categories:
•
•
•
•
•
Fundamental:
Interdisciplinary:
access control
security architecture and design
physical security
application security
operations security.
• penetration testing
• security and risk management
• business continuity and disaster
recovery planning
• digital forensics
• legal, regulations and
compliance.
Course Delivery
The knowledge and skills to be covered are delivered in
two major sections:
• The first section will provide a basic understanding of
information security and assurance, which will cover the
common body of knowledge (CBK) developed by
(ISC)2 (see http://www.isc2.org/). Eight topics to be
covered.
• The second section will be devoted to learning and
practicing penetration testing. Eight hands-on exercises
from the Certified Ethical Hacking (CEH) program will
be explored in a virtual security lab (see
http://www.eccouncil.org/ceh.htm).
Interests and Expertise
• Information and cyber security, especially in wireless
security, intrusion detection, security and risk management,
and cyber forensics.
• Radio Frequency Identification (RFID) and Smart Sensing,
with applications in healthcare, environmental monitoring,
and supply chains.
• Intelligent technologies and their applications in business,
communication network design, and data mining.
• Information technology for manufacturing/operations
management. Manufacturing systems design and supply
chain management and integration.
Grading Weights
Evaluation of knowledge and understanding of
materials will be by:
• Hands-on exercises (8): 800 points.
• Quizzes (8): 400 points.
• Team Project: 480 points.
• Presentation: 120 points.
• Discussion/participation: 200 points.
Key References
• Tipton, H. and Henry, K. (Eds.), Official (ISC)2
Guide to the CISSP CBK, Auerbach, 2007.
• Hansche, S., Berti, J. and Hare, C., Official
(ISC)2 Guide to the CISSP Exam, Auerbach,
2004.
• These two references are key for preparing
CISSP certification examination.
Schedule
• It is very important that you follow
the schedule closely. Please check the
syllabus for schedule.
• Most of the assignments are
scheduled to be due on Sunday, 5
minutes before midnight.
• Please complete the introduction
event and start to communicate to
each other and form teams as soon as
possible.
Course Policies
• Due date will be enforced according to the
schedule.
• Communication. Please use e-mail within
Angel.
• Academic Integrity. We committed to academic
integrity, so do you.
• Accommodating disabilities. We are working
hard to meet the requirements.
• Please refer to the syllabus for details
Nature of the Quiz
IST 515 quizzes are designed to emulate the Certified
Information Systems Security Professional (CISSP)
certification examination; therefore, its question format,
style, coverage and study methods are similar to CISSP.
Emulate
Quiz Topics
• Quiz 1: Information Security and Risk Management (Topic 2)
• Quiz 2: Security Architecture and Design (Topic 3)
• Quiz 3: Access Control (Topic 4)
• Quiz 4: Application Security (Topic 5)
• Quiz 5: Physical Security (Topic 6)
• Quiz 6: Operations Security (Topic 7)
• Quiz 7: Business Continuity and Disaster Recovery (Topic 8)
• Quiz 8: Legal, Compliance, and Investigations (Topic 9)
( Please refer to syllabus for due date )
Quizzes Specifics
• For each quiz, there are 25 questions (randomly
drawn from more than 100 questions) and you will
have about 15 minutes to complete the quiz once
started the quiz. The quiz is a closed book exam,
just like CISSP exam.
• The quizzes are as difficult as CISSP certification.
70% is the passing grade for CISSP. The quiz
average for the class is often below or just near
70%.
• If you can find some test bank and practice, your
score may increase (just like preparing for CISSP
certification).
Major References
• Tipton, H. and Henry, K.
(Eds.), Official (ISC)2 Guide
to the CISSP CBK,
Auerbach, 2007.
• Hansche, S., Berti, J. and
Hare, C., Official (ISC)2
Guide to the CISSP Exam,
Auerbach, 2004.
Taking the Quiz
The quiz can be found in the Angel site under the
“Quizzes” folder. The quiz will be available when they
are assigned.
The quiz will
be available
when they
are assigned.
Technical Assistance
1. Check the Angel Help Menu (left)
2. Take screenshot, contact Angel
Support (below)
3. Contact us (with screenshot)
Angel Project Folder
Project Guideline
• Purposes
• Project Description
• Project Details
1. Hands-on Lab Development
2. Practical Report
3. Research Paper
• Deliverables
1.Project Proposal
2.Progress Report
3.Final Projects Report
4.Project Presentation
• Overall Project Grading
Drop Box
Objectives
The main purposes of this project are:
 To develop/enhance in-depth understanding on a
subject in information security and assurance
 To provide students opportunities in practicing:
– problem solving,
– project management,
– communication,
– presentation, and
– teamwork skills.
Types of Project
• This is a team-based project, which can be completed
by a group of 3 or 4 participants.
• You can select one of the following project types:
– design and practice a hands-on penetration test lab,
– write a paper/case to report security incidence or
practice, and
– write a paper to sharpen research skills.
Hands-on Lab Development
• Wireless Networks
• Mobile Phone
• Bluetooth devices
• RFID devices
• e-mail Accounts
• Sensor Networks
• Global Positioning
System (GPS)
• Web Servers
• Session Hijacking
• Spamming
• USB Devices
• Cloud Computing
• Social Network
• VoIP
• …
Research Type Paper
• Economics of Information Security
• Human Factors in Security,
• Trust Negotiation / Management,
• Threats/Risk/Security/Privacy of:
–
–
–
–
–
–
–
–
RFID Networks/Systems,
Sensor Networks,
Internet of Things (IoT),
Social Networks,
Cloud Computing,
Supply Chains,
Healthcare.
…
Deliverables
• Project Proposal (15 points).
• Progress Report (20 points): Two scenarios (6
points); Related works (5 points); Framework,
solution method or initial data collection (9 points).
• Final Projects Report (45 Points): The report should
be professionally written and should include both
lab design and report (option 1) or paper.
• Project Presentation/Slide (20 points): quality of
visual aids, organization and content of the
presentation, plus the poise and delivery of the
speaker.
• Please refer to Syllabus for due dates.
Project Proposal
• The title, description of the subject/issue/problem (what,
why, how) and objectives of the project. (6 points)
• Preliminary review of the literature and Internet
resources. Citations to papers, books, programs, or URLs
that you have consulted in exploring or designing your
project. (5 points)
• A description of your project plan. Discuss how the work
will be divided among the team members. (2 points).
• Writing style and professionalism (2 points).
Recording & Posting
1. Test your computer
2. Record your presentation
3. Post your presentation
For team collaboration
Past Projects
•
•
•
•
•
•
•
•
•
•
•
Wireless Network Hacking
Web Server Fingerprinting and Exploitation
XSS and SQL Injection Web Server Attack
Revealing the Threat Behind Social Networking
Developing a Hands-on Spamming Lab
Developing a Security Policy
Penetration Testing on a Live Web-Application
Radio Frequency Identification Security Concerns
Layer 2/3 Network Attacks and Prevention
Attacking a Mobile Phone Hands-on Lab
Threats and Security of Cloud Computing
Thank You?
Any Question?
Download