Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.

Slides:



Advertisements
Similar presentations
MY NCBI (module 4.5). MODULE 4.5 PubMed/How to Use MY NCBI Instructions - This part of the: course is a PowerPoint demonstration intended to introduce.
Advertisements

Microsoft ® Office OneNote ® 2007 Training Using your Notebook to its fullest potential Kent School District presents:
Getting Started with Moodle Bronze Level – Compulsory.
This work is licensed under a Creative Commons 3.0 Attribution License.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Table of Contents Part B Managing Documents & References File organizer Citing references Creating bibliographies/Using MS Word Plugin Sharing documents.
The Blackboard Project EDIT 652 Fall 2005 Dr. Mike Uttendorfer.
Welcome to MAT 170. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Wednesday and Friday 10:40 am – 11:30 am and by appointment.
Welcome to MAT 170. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday and Thursday 8 am – 8:30 am Tuesday and Thursday.
What to Expect Learning the concepts of AIS “Teachers open the door. You enter by yourself” (old Chinese proverb) Applying the concepts (Group Case) “What.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
CS150 Final Exam Review 1 CS150. What you can bring with you  The paper (cheat sheet) that you used on the excel exam 2 CS150.
Presented by Chad Kafka This Month’s Topic: Wikispaces Advanced Today’s session is an introduction to what a WIKI is and how they can be used in education.
Your User Name is the first portion of your Carleton Connect account eg. mroger4 if the was n.ca
MyMathLab How to Study Hints from Professor of Mathematics Jon Odell.
Ho Chui Chui ELC093 Academic Writing for Foundation Studies Briefing Credit unit: 3 Contact hours: 6 Pre-requisite: ELC080, ELC091.
Developing and Implementing Syllabus and Course Modules Jerash University Development of Interdisciplinary Program on Climate Change and Sustainability.
What to Expect Learning the concepts of AIS “Teachers open the door. You enter by yourself” (old Chinese proverb) Applying the concepts (Group Case) “What.
COURSE ADDITION CATALOG DESCRIPTION To include credit hours, type of course, term(s) offered, prerequisites and/or restrictions. (75 words maximum.) 4/1/091Course.
1 Web Basics Section 1.1 Compare the Internet and the Web Compare Web sites and Web pages Identify Web browser components Describe types of Web sites Section.
Active Learning Ideas WebCT. Level 1: Web supported / Web-presence Web supported (Web-presence) courses are courses where basic materials about the course.
Google Classroom.
Course - DT249/1 Subject - Information Systems in Organisations COURSE SUBJECT OVERVIEW Semester 1, Week 1.
How to use in your classrooms? Presented by Steve Adler, Cheryl Butler, Allen Day, and Hyewon Lee 1.
CST 229 Introduction to Grammars Dr. Sherry Yang Room 213 (503)
February 28, 2008The Teaching Center, Washington University The Teaching Citation Program & Creating a Teaching Portfolio Beth Fisher, Ph.D. Assistant.
Language Development: The Course Jan. 6, The Course Designed to give students a comprehensive understanding of language development, primarily in.
Course - DT249/1, DT249/1P Module (Subject) - Information Systems in Organisations COURSE SUBJECT OVERVIEW Semester 1, Week 1 1.
WawasanLearn Student Orientation January 2010 Semester.
Instructional Plan | Slide 1 AET/515 Instructional Plan December 17, 2012 Kevin Houser.
Creating a Digital Classroom. * Introduction * The Student Experience * Schoology’s Features * Create a Course & Experiment.
© 2007 Pearson Education, Inc. publishing as Longman Publishers. Chapter 1: Student Success Breaking Through: College Reading, 8/e by Brenda Smith.
{ International Baccalaureate ® Economics (SL) Mr. Rich Blanc Room B115.
Writing for Proficiency with Georgie Ziff. English 3000 is a course to help you meet the University Writing Skills Requirement. You must submit a Final.
Where are you joining us from
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Welcome To MOODLE Getting Started. Introductions Christa McLaughlin – High School math teacher and high school lead teacher of technology Jason Grubbs.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
What to Expect Learning the concepts of AIS “Teachers open the door. You enter by yourself” (old Chinese proverb) Applying the concepts (Group Case) “What.
Wikispaces Cody Bell, Jill Boyle, Jamie Card & Cody Connolly.
CS151 Introduction to Digital Design Noura Alhakbani Prince Sultan University, College for Women.
Research Experience Program (REP) Spring 2008 Psychology 100 Ψ.
Course Objectives Gain a strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
This will be an interactive class, prepare to participate!!!
ACG 4401 Accounting Information Systems Introduction Syllabus Highlights.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Course Objectives Gain a strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security.
Google Docs An introduction to Google Docs. Session Objectives Participants will become familiar with the various applications available within Google.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
Research Experience Program (REP) Fall 2007 Psychology 100 Ψ.
ACC 340 Academic professor/tutorialrank For more course Tutorials
Teaching and Learning in a Web 2.0 World. Today’s Purpose Review of Session 2  Overview of wikis and blogs  Learning benefits of wikis and blogs  Teaching.
For more course tutorials visit ACC 492Entire Course For more course tutorials visit ACC 492 Week 1 Individual Assignment.
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
Quarterly Projects. Guidelines  One project per quarter  Different project each quarter  One quarter MUST be book report frame  Each project worth.
Financial Management of ECE Programs.  Go to “Tools”  Click on “Personal Information” to edit your personal information (including address) or.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Advanced Accounting Information Systems Summer 2011
MMW 15 TA: Kyle Knabb Week 1.
IT 286 RANK Imagine Your Future /it286rank.com
Advanced Accounting Information Systems Summer 2017
Editing Your Website on SharePoint 2013
CMGT 431 Education for Service/tutorialrank.com
CMGT 431 STUDY Education for Service- -cmgt431study.com.
The Five Stages of Writing
Book Of Choice Final Report
Presentation transcript:

Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An understanding of networking concepts. You will learn of the importance of IT security to the accounting profession and of the various control frameworks that accountant's rely on for SOX compliance. This course is learning about defense so we will learn about many threats and how they exploit vulnerabilities but we will NOT be using these exploits in class. 2

Syllabus Highlights Dr. Steven Hornik Course Webpage: Office Hours: Tuesday & Thursday 5:00-6:00 ; and by appointment Office: BA1 432

Text Book Corporate Computer and Network Security, 3 rd Edition by Randall J. Boyle and Raymond R. Panko

Grade Components Exam 1 (Ch. 1 – 4, module A)250 Exam 2 (Ch. 5- 9)250 Access Control Simulation100 Security in the News 50 Research Paper200 Total Points850

Grading Scale A A B B B C C C D D D F 0.00 <59

Exams Two Part Exams 1 st Part Multiple choice Matching Time Limit 45 – 60 minutes 2 nd Part Short-answer / Essay (with Notes/Book) Time Limit 2 hours Exams can be taken in any order

WikiSpace Invitation or Click “Join” button Join if you haven’t Collaborative Web Pages You can Add material to any page You can Edit material already posted to a page You can Delete material posted to a page You can Create a new page with new material Material text content Hyperlinks WebPages, Podcasts, Video, Audio, etc. Group Research/Project Paper Each group will have its own Team page(s) for supporting collaborative work.

Wiki Pages to Update Security in the News

Security In The News Locate an article/video, etc. related to a security breach 1.Insert a link to the resource (article, video, etc.) 2.Provide a summary of what happened 3.Detail the breach that occurred 4.Provide a description of what control could have prevented/detected the breach Grading: 2 articles up to 50 points 1 articles up to 40 points Quality counts If you post more than 1 article the type of breach needs to be different in each. No duplicate articles allowed 10

Research/Project Paper Groups of 5 Group Assessment 10 page final paper Dates: Initial Title (1 sentence) – 05/04/2012 Summary idea (1 page + group assessment rubric) 05/13/2012 Draft – 5 page minimum – 06/19/2012 Final paper – 07/05/2012 Topics (only 2 groups can do the same topic) Using OCTAVE Allegro, create an risk assessment, using the OCTAVE Allegro worksheets, for an organization you work for or have access to. Identifying between 5-7 critical information assets. Beyond the risk assessment this project requires a summary of how risk assessment fits within the IT Governance frameworks Using the various standards/frameworks, COBIT, ISO, ITIL, etc. create a report of the similarities between them and come up with a list of common controls, i.e. create a grand unified control document. The paper should include summaries of each of the frameworks included and a compare/contrast section. Research and prepare a report on the compliance issues related to SOX and IT Security. In-depth analysis of a current topic related to accounting and IT-Security (e.g. cloud computing). 11

Access Control Simulation 12

Access Control Simulation - Tutorial 13

Access Control Simulation 14

Access Control - Office 15

Access Control Report You have been hired to conduct an IT control review Examine the office locations Each office Each Cubicle Each room Note controls in place Note missing controls Prepare report summarizing your findings Include a table that shows: Place Visited Control found Control Missing Recommended Fix (if necessary) 16