ITS415: Principles of Cybersecurity Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 10-25 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Faculty Information Name: Phone: CSU-GC Email: Virtual Office Hours: Course Description and Outcomes Concern for cybersecurity is real. Organizations today are more vulnerable to logical attacks than ever before. The reasons for such cyberattacks are multitudinous and protection against them is tenuous at best. While motivation for the attacks might range from personal gain to theft of proprietary information to corporate fraud and terrorism, protection demands that adequate measures are put in place that ensure the security and integrity of an enterprise. This course provides an overview of cybersecurity threats, compromises and the related protection mechanisms. Topics such as security of communications, networks and infrastructures are covered. Besides, best practices in security policy formulation, cyberforensics and prevention of cybercrimes are also discussed. Overall, the course introduces the latest developments in the field. Course Learning Outcomes: 1. Develop the ability to recognize technical and organizational computer security issues. 2. Develop an appreciation for the importance of communication security and how it impacts the overall security of an enterprise 3. Develop an understanding of various kinds of cyberattacks 4. Evaluate the impact of hacker and computer espionage activities on the overall security of the organization 5. Evaluate aspects of vulnerability scanning, forensics and cyberdetection in ensuring information security Participation & Attendance Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible. Course Materials Required: Easttom, C. (2012). Computer security fundamentals (2nd ed.). Indianapolis, IN: Pearson. ISBN: 9780789748904 Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 12 midnight MT and Peer Responses posted by Sunday 12 midnight MT. Late posts may not be awarded points. Mastery Exercises: Students may access and retake mastery exercises through the last day of class until they achieve the scores they desire. Critical Thinking Activities: Assignments are due Sunday at 12 midnight MT. Week # 1 Readings Chapters 1 & 2 in Computer Security Fundamentals Discussion (25 points) Mastery (10 points) Chapter 3 in Computer Security Fundamentals Chapters 4, 5 & 6 in Computer Security Fundamentals Discussion (25 points) Mastery (10 points) Critical Thinking (30 points) Discussion (25 points) Mastery (10 points) 2 3 Assignments Chapter 7 in Computer Security Fundamentals Chapters 8 & 9 in Computer Security Fundamentals Chapters 10 & 11 in Computer Security Fundamentals Chapter 12 in Computer Security Fundamentals Chapters 13 & 14 in Computer Security Fundamentals 4 5 6 7 8 Critical Thinking (70 points) Portfolio Topic (0 points) Discussion (25 points) Mastery (20 points) Critical Thinking (60 points) Discussion (25 points) Mastery (10 points) Critical Thinking (60 points) Portfolio Outline (0 points) Discussion (25 points) Mastery (10 points) Critical Thinking (70 points) Discussion (25 points) Mastery (10 points) Critical Thinking (60 points) Discussion (25 points) Mastery (20 points) Portfolio (350 points) Assignment Details This course includes the following assignments/projects: Module 1 PORTFOLIO: For your portfolio project, you will analyze five cybersecurity breach cases. Review the project instructions under Week 8’s module. Contact your instructor if you have any questions Module 2 Critical Thinking: Essay: Cyberstalking and Abuse (30 points) There are several convicted cases of cyberstalking and Internet fraud/abuse (e.g. Misha Glenny, a UK based journalists recently wrote a book on the subject matter appropriately titled, Dark Markets). For this critical thinking assignment you are required to scan the popular press (especially The Wall Street Journal) and find at least 5 cases of individuals who have been convicted of cyberstalking, fraud and abuse. Document each case and provide a brief synopsis. What issues do these cases bring to light? What laws might attach? Be sure to provide citations from your readings to support your statements. Cite your sources using CSU-Global APA formatting. Module 3 Tools (70 points) Create a response to 3 of the following 5 questions: 1) What are the common tools used for DoS? 2) How does a Virus spread? 3) What is a Buffer-Overflow attack? 4) How does a SQL injection attack take place? 5) Discuss tools that a hacker can use to crack passwords. Combined, your responses should be 2-3 pages long. Be sure to provide citations from your readings to support your statements. Cite your sources using CSU-Global APA formatting. Portfolio Topic (0 points) Review the instructions for the Portfolio Project in Module 8. Submit your portfolio topic in the assignment drop box. Include a paragraph describing why you chose that topic and what you problems you anticipate in researching your subject. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 4 Critical Thinking: Project Reports (60 points) Complete the following projects from your textbook (also linked): 1) Preventing Corporate Espionage (project 7.1 on page 152 at the end of chapter 7) 2) Handling Employees (project 7.2 on page 152 at the end of chapter 7) 3) Asset Identification in your Organization (project 7.3 on page 152 at the end of chapter 7) Your answers should be 2-3 pages in length. Be sure to provide quotes from your readings to support your statements. Cite your sources using CSU-Global APA formatting. Module 5 Critical Thinking: Case study (60 points) Read the following case study available through Proquest (CSU-Global Library) Czosseck, C., Ottis, R., & Talihä, A. (2011, July). Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. European Conference on Information Warfare and Security, 57-IX. Answer the following questions in a 1-2 page paper: 1) What strategic recommendations would you make? 2) What operational security aspects should be considered so as to prevent such attacks in the future? 3) What sort of an encryption policy, if any, would have helped in this situation? Be sure to provide citations from your readings to support your statements. Cite your sources using CSU-Global APA formatting. Portfolio Outline (0 points) Submit an outline of your portfolio. Review the requirements of the portfolio in Module 8. The outline should reflect the topic you chose in Module 3, and cover all the required elements of the assignment. Submit your outline in the assignment dropbox. Include with your outline a draft of your proposed sources, listed in correct APA format. No points are assigned for this deliverable, but points will be deducted from your final grade on the Portfolio Project if you fail to submit this item as required (see the Portfolio Project Rubric for grading details). Additionally, you will be expected to account for the instructor's feedback in the final version of the Portfolio Project assignment Module 6 Critical Thinking: Essay (70 points) Write a 3-4 page essay on the topic, “Building and implementing a successful cybersecurity policy”. The following topic areas should be covered in the essay: 1) What would be a successful cybersecurity policy? 2) What are the ingredients of a typical cybersecurity policy? 3) How should the various elements of a cybersecurity policy be articulated? 4) What considerations should there be in order to successfully implement the policy? 5) How can you assure the ongoing success of the policy? Be sure to provide citations from your readings to support your statements. Cite your sources using CSU-Global APA formatting. Module 7 Critical Thinking: Case study (60 points) Consider the WikiLeaks case study available in the CSU-Global Library on Proquest: Ryst, S. (2011). WikiLeaks fuels data breach fears. Business Insurance, 45(1), 1-20. The disclosures at WikiLeaks have raised significant concerns about the damage caused by leaks. Some claim that in many ways, the Wiki Leaks founder, Julian Assange, was terrorizing nation states and corporations. What corporate and/or national policy initiative do you think should be put in place to curb such forms of cyberterrorism? Your analysis should be 2-3 pages. Be sure to provide citations from your readings to support your statements. Cite your sources using CSU-Global APA formatting. Module 8 Portfolio Project (350 Points) Throughout this course you have been collecting incidents of security breaches and potential mitigation strategies. For your final Portfolio assignment: 1. Submit a list of cybersecurity breach case studies 2. For each breach highlight a) what went wrong b) how could it have been prevented c) what organizational measures should be instituted 3. Include examples with dates when the incident took place and what was the outcome. 4. Write a short summary (2 pages, 1.5 spacing) of your key learning points in management of cybersecurity within enterprises. Cite and integrate at least four credible sources to support your summaries from the CSU-Global Library. Submit your portfolio as a single document. Prior to Week 8, you will submit your topic choice in the assignment drop box in Week 3. In Week 5, you will submit an outline of your project in the drop box. The portfolio should reflect correct APA citation style and include a page of references. Course Policies Late Work Students are permitted a 7 day grace period during which they may submit a Critical Thinking assignment after the original due date without penalty. Papers submitted between 8 and 14 days after the original due date will be accepted with a potential 10 percent reduction in grade for late submission. Papers submitted 15 or more days beyond the original due date may not be accepted unless prior arrangements have been made with the instructor. No Portfolios will be accepted late and no assignments will be accepted after the last day of class unless a student has requested an incomplete grade in accordance with the Incomplete Policy. Course Grading 20% Discussion Participation 10% Mastery Exercises 35% Critical Thinking Activities 35% Final Portfolio Paper Grading Scale and Policies A 95.0 – 100 A- 90.0 – 94.9 B+ 86.7 – 89.9 B 83.3 – 86.6 B- 80.0 – 83.2 C+ 75.0 – 79.9 C 70.0 – 74.9 D 60.0 – 69.9 F 59.9 or below FN* Failure for Nonparticipation I** Incomplete * Students who stop attending class and fail the course for nonparticipation will be issued the “FN” grade. The FN grade may have implications for financial aid and scholarship awards. ** An “I” grade may be assigned at the Instructor’s discretion to students who are in good standing (passing) in the course. Students should have completed a majority of the coursework in order to be eligible for the “I” grade. Students should request an "I" grade from the Instructor with a written justification, which must include explanation of extenuating circumstances that prevented timely completion of the coursework. If the request is approved, the Instructor will require a written agreement consisting of a) the specific coursework to be completed, b) the plan to complete the coursework, and c) the deadline for completion. The agreement will be kept on file at CSU-Global Campus. An incomplete course must be satisfactorily completed within the time frame stipulated in the agreement, but no later than the end of the following semester from the date the “I” was given. An incomplete not removed within one year shall convert to an F and be included in the computation of the student’s grade point average. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, plagiarism, unauthorized possession of academic materials, and falsification. The Student Handbook provides information on how students can avoid plagiarism by understanding what it is and how to use library and internet resources appropriately with proper citation. Please refer to the Academic Catalog for complete policies regarding plagiarism and academic dishonesty. APA Students are expected to follow the CSU-Global APA requirements when citing in APA (based on the APA Style Manual, 6th edition). For details on CSU-Global APA style, please review the APA resources located under the Library tab in Blackboard. Netiquette All posts and classroom communication must be conducted in a professional and respectful manner in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? Any derogatory or inappropriate comments regarding race, gender, age, religion, sexual orientation, are unacceptable and subject to disciplinary action. If you have concerns about something that has been said, please let your instructor know. Institutional Policies Refer to the Academic Catalog for comprehensive documentation of CSU-GC institutional policies.