Online discussion area
Location
Class topics
Syllabus
License
The class materials are best viewed at https://mlhale.github.io/CYBR3600/
I have setup an online discussion board on slack.com for usage in this class. If you decide to work on a group project, I can create some private channels for you to work on, but I want to be able to participate in your conversations - so please use the space on slack.
Go to drhale3600.slack.com and use your unomaha email address to register an account. Alternatively, you can use this link.This will give you access to the class slack channel. The chat channel is for general discussions with me or your fellow classmates. The questions channel is for you to ask public questions that I will answer for the whole class. This is better than email if you think that the answer to your question might benefit everyone. You can also send me private messages. Generally I am faster at replying on slack than I am by email.
All classroom activities will take place in PKI room 252 unless otherwise noted ahead of time.
- Information Security Governance by Krag Brotby (ISBN: 978-0470131183)
- Book is available free online via the Library
- NIST SP 800-53
- NIST SP 800-37
- FIPS 199
- NIST SP 800-66
- Other Handouts TBA
-
Introduction and Governance (Lecture 1 Slides)
- Icebreaker
- Information Security Governance
- Intro to Risk Management
-
Risk and Strategic Decision making (Lecture 2 Slides, Lecture 3 Slides)
- Asset Identification
- Strategic value
- Threats and scopes
- Quantifying Loss
- Homework: Risk and Loss
- Quiz 1: Risk and Governance
- Decision Trees
- Risk attitude and utility theory
- Risk Prioritization
- Example Decision Tree problem
- Homework: Decision Trees
- Extra practice problems
- Quiz 2: Probabilistic Risk and Decision Trees
-
High Level Policy Creation (Lecture 4 Slides)
- Business and governance requirement gathering
- Scopes and functions of different policy documents
- Internal consistency and style
- Defining Roles and Responsibilities
- Policy metrics and measurements
- Homework: Policy review and Analysis
-
U.S. Compliance Laws and Security Controls (Lecture 5 Part 1 Slides, Lecture 5 Part 2 Slides, Lecture 6 Slides)
- Policy concerns by security domain
- Aligning Policy with regulations and standards
- Overview of HIPAA, GLBA, SOX, FERPA
- Focus on FISMA
- Quiz 3
- Security Control standards
- NIST SP 800-66
- PCI DSS
- COBIT 5
- ISO 27002
- Common Criteria
- Maturity Model
-
Project: Business Creation and Product FISMA Certification
- Assess business security program maturity
- Identify business assets
- Select Security Controls
- Assess information systems against selected controls
-
Formal methods for policy representation and certification (Lecture 7 Slides)
- Propositional and First-order logic
- Representing policies in first-order logic
- Stating non-compliance formally
- In-class Logic Exercises
- Homework: Formal Logic
- State-based temporal models
- Covert channels
- Access Control Matrix
- Quiz on First-order Logic (paper handout)
-
Certification Project Presentations
-
Information Flow Control & Policy Composition (Lecture 8-9 Slides)
- Multi-domain policies
- Dealing with third parties
- Composable informal and formal policies
- Detecting policy constraint violations
- XACML Exercise/homework
-
Security Awareness and Training (Lecture 10 Slides)
- Constructing an enterprise-wide training plan
- Protecting against social engineering
- SET Exercise/homework
- Protecting against “Post-it note” style problems
-
Final Exam
- Practice problems
- 50 HW Point Extra Credit Opportunity (adds 50 points to your total homework subscore)
- Take part in an online cyber-training study by visiting
cybertrust.mlhale.com/unostudy/<your firstname-lastname>
Example: cybertrust.mlhale.com/unostudy/matt-hale
- OR Do a project on security awareness and training plan creation. See Project: Security Awareness and training plan
Date/Time: Tuesday/Thursday 1:30pm – 2:45pm
Instructor: Dr. Hale
Office: PKI 174-D, (402) 554-3978
Office Hours: Open door policy, or by appointment
E-mail: [email protected]
Policy is an integral element of Information Security within and across organizations. This course will cover the development of security policies and procedures at an organizational level, how such policies are intertwined with regulatory compliance necessities, and the legal, ethical, and financial implications of policy. Students will leave with the ability to go into an organization and understand the basis for and effect of IT policies. Students will also be able to apply policies to information systems and cover human factors such as constructing a security awareness campaigns to satisfy operational security controls and prevent attacks such as phishing and spear phishing.
- (10%) Class participation
- (40%) Homework & Projects
- (20%) Quizzes
- (30%) Final Exam
Each project will have a specific grading rubric that includes the core requirements for the project (i.e. what the application must do), any required intermediate milestone goals (such as short progress meetings with the instructor), the project due date, and the list of items that must be submitted. At least one of the projects will include a presentation component to be presented in class on the project due date.
- Class Attendance: Attendance is highly recommended, there are a number of in-class participation measures, so if you miss class your grade may suffer.
- Presentation Attendance (Mandatory): If you miss class on a presentation day (Dates TBA) you will receive a 0 on the presentation portion of the project grade unless you have a university-approved excuse or an approved extension (see below).
Students may choose (or be compelled) to work in groups on certain assignments. Group work may optionally (at the discretion of the instructor) include an individual participation grade worth 40% of the total group points, e.g. a group may make a 100% on a particular project, but an individual with low participation in the group may make a 60%.
The instructor reserves the right to make a change to any team or any project during the course of the semester for any reason that may or may not be disclosed. Project rescoping will be performed in this event.
As part of UNO’s strategic initiatives, individuals or groups may be partnered with community organizations in Omaha for service learning. If community partners can be identified, student projects (group or individual) in the class may be directed at meeting community needs. In the event of community projects, appropriate scoping will be considered to ensure that community needs can be met within the time constraints of the coursework.
Sometimes unforeseen events occur or work takes longer than expected. In such cases, an extension may be requested. To receive an extension, individuals or groups must request an extension at least 24hours in advance of the due date. Extension time frames are at the discretion of the instructor, but generally will not be longer than 1 week. Failure to request an extension 24 hours prior to the due date means that the work is due at the specified time. Granting extensions is at the discretion of the insturctor. Late work without a requested extension will receive a 5% point reduction per day up to a total of 40%. Late work submitted 8 days after an original (or extended) due date will not be accepted.
Students with disabilities requiring special accommodations must contact disability services. Disability services may be reached by phone at (402) 554-2872 or by email at [email protected].
Students serving in the military requiring special accommodations (e.g. unit deployment) must contact the office of Military and Veteran Services by phone at (402) 554-2349 or by email at [email protected].
Students from all backgrounds and perspectives are respected in this course. Diverse viewpoints will be viewed as a resource, strength, and benefit to the course rather than a non-conformity. It is the intent of the instructor to conduct the course in a way that is respectful to students regardless of their race, color, ethnicity, national origin, sex, pregnancy, sexual orientation, gender identity, religion, disability, age, genetic information, veteran status, marital status, and/or political affiliation. Intolerance is interlorable and will not be tolerated by the instructor. Students are expected to treat their fellow students with respect. No question is a bad question and it is not acceptable to marginalize other students.
The university policies on cheating and plagiarism apply in this course. Except on designated group work, the expectation is that every student will do their own work. Students under suspicion of plagiarism for individual assignment submitted materials will be given an opportunity to defend themselves. If after defense the instructor still believes the work to be plagiarized the department chair will be notified and the grade evaluation for the assignment will be lowered to a value between 50% and 0% at the discretion of the instructor. If a second occurrence of plagiarism occurs, the student will receive an F for the course and the registrar’s office will be notified that the student is not permitted to withdraw from the course. In addition the department chair and dean will be notified.
The CS and IS programs in the College of IS&T are accredited through ABET (the Accreditation Board for Engineering and Technology. This organization occasionally requires that we keep samples of student work.
The instructor may retain a copy of your exams (with names and any other identifying information removed) for accreditation or pedagogy purposes, unless you specify otherwise in writing.
In addition, the instructor retains the right to use any code or project artifacts developed in the course for pedagogy, research, or service learning purposes. Student web project code developed in the course may be used in future secure project development courses, by the instructor for research purposes, or by designated stakeholders.
Information Security Policy Copyright (C) 2017 Dr. Matthew L. Hale
Copyright (C) Dr. Matthew Hale 2017.
This lesson is licensed by the author under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.