Optional

CNIT 160: Cybersecurity Responsibilities

Fall 2020 Sam Bowne

Schedule · Lectures

79623 502 Sat 1:10-4:00 PM

Class meets Monday evenings
at 6:10 PM Pacific Time

https://zoom.us/j/4108472927

Password: student1

Free Textbook Access

  • Go here
  • Click "Safari Online"
  • In the "Select your Institution" drop-down list box, click "Not listed? Click here"
  • Enter your CCSF email address
  • Enter the book's title the "Find a Solution..." field

Required

Catalog Description

Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.

Student Learning Outcomes

Upon completion of this course, a student will be able to:
  • Compare security technologies including encryption, storage, and transmission methods
  • Evaluate social and political arguments relating to information security and privacy
  • Engage in healthy and constructive debates that include both technical and political issues around security

Textbook

"CISM Certified Information Security Manager All-in-One Exam Guide 1st Edition" by Peter H. Gregory
Publisher: McGraw-Hill Education; 1 edition (March 19, 2018), ISBN: 1260027031, Buy from Amazon ($35)

Quizzes

The quizzes are multiple-choice, online, and open-book. However, you may not ask other people to help you during the quizzes. You will need to study the textbook chapter before the lecture covering it, and take the quiz before that class. Each quiz is due 30 min. before class. Each quiz has 5 questions, you have ten minutes to take it, and you can make two attempts. If you take the quiz twice, the higher score counts.

CCSF students should take quizzes in the CCSF online Canvas system: https://ccsf.instructure.com/

Non-CCSF students: Enroll Here (reset password, if needed)

Presentations and Papers

Each student must make two in-class Presentations and write two Papers. Topics must be submitted in advance. Presentations will be strictly limited to four minutes. Papers must be 500 - 1000 words, written in proper grammatical English, and free of plagiarism. Papers must be submitted in Canvas or emailed as plaintext in the body of an email to CNIT.160@gmail.com

Here is an example of a suitable paper:

Xi's choice: Destroy Trump, or save him and weaken America

Discussion Board

Each CCSF student must contribute to the Discussion Board in Canvas. There are dates listed in the schedule with Discussion assignment due.

For the topics and requirements, see the Discussion board in Canvas.

Email

For questions, please email CNIT.160@gmail.com

Optional Books

  

 

 

Schedule (may be revised)


Sat 8-15  1 Becoming a CISM & Cyberwar


Sat 8-22Quizzes: Ch 1 & 2a *
Discussion 1: Introduce Yourself *
2 Information Security Governance


Sat 8-29Quiz: Ch 2b *
Discussion 2: Career Planning
2 Information Security Governance


Fri 9-4 Last Day to Add
Sat 9-5 Holiday: No Class

Sat 9-12Quiz: Ch 3a
Topic 1 Due (5 pts)
Discussion 3: A Security Governance Win
3 Information Risk Management


Sat 9-19Quiz: Ch 3b
Early Presentation 1 (+10)
Discussion 4: A Security Governance Failure
3 Information Risk Management


Sat 9-26Presentation 1 (50 pts) 3 Information Risk Management


Sat 10-3 Discussion 5 3c Information Risk Management


Sat 10-10Quiz: Ch 3c & 3d
Discussion 6
3d Information Risk Management


Sat 10-17Quiz: Ch 4a
Topic 2 due
Discussion 7
4a Information Security Program
Development and Management


Sat 10-24Quiz: Ch 4b
Paper 1 due (50 pts)
4b Information Security Program
Development and Management


Sat 10-31Quiz: Ch 4c
Discussion 8
4c Information Security Program
Development and Management


Sat 11-7Quiz: Ch 4d
Presentation 2 (50 pts)
4d Information Security Program
Development and Management


Sat 11-14Quiz: Ch 4e
Late Presentation 2 (-10)
Discussion 9
4e Information Security Program
Development and Management


David Gerard

         

Blog · Twitter

Blockchain: Magic (Probably) Doesn't Happen

Paper 2 due (50 pts)

Sat, Nov 21, 1 PM PST

This talk will be recorded and put on YouTube.


Sat 11-28 Holiday: No Class

Sat 12-5No Quiz
US v. China


Fri 12-11 -
Fri 12-18
Final Exam available online throughout the week.
You can only take it once.
All quizzes due 30 min. before class
* No late penalty until 9-16

Lectures

Syllabus (PDF)
Grading Policy (PDF)

1 Becoming a CISM

Ch 1: Becoming a CISM
Ch 1c: Cyberwar
PDF · Keynote
PDF · Keynote
Unwanted Truths: Inside Trump's Battles
With U.S. Intelligence Agencies

2 Information Security Governance

Ch 2a: Introduction to Information Security Governance
Ch 2b: Security Strategy Development
Ch 2c: US v. China
Ch 2d: Ill Winds
America's Caste System
PDF · Keynote
PDF · Keynote
PDF · Keynote
PDF · Keynote
PDF · Keynote

3 Information Risk Management

Ch 3a: Risk Management Concepts & Implementing a Program
Ch 3b: The Risk Management Life Cycle
Ch 3c: The Risk Management Life Cycle
Ch 3d: Operational Risk Management
PDF · Keynote
PDF · Keynote
PDF · Keynote
PDF · Keynote

4 Information Security Program Development and Management

Ch 4a
Ch 4b
Ch 4c
Ch 4d
Ch 4e
PDF · Keynote
PDF · Keynote
PDF · Keynote
PDF · Keynote
PDF · Keynote

5 Information Security Incident Management

Security Incident Response Overview
Incident Response Plan Development
Responding to Security Incidents
Business Continuity and Disaster Recovery Planning

Links

Radix Economic Model (1-31-19)
60% of small companies that suffer a cyber attack are out of business within six months.
Larry Diamond talks Russia, China, "Ill Winds" on Kara Swisher podcast (Aug, 2019)
North Korea stole $2 billion from banks (SWIFT attacks) and cryptocurrency exchanges for its nuclear weapons program (ty @violetblue) (Aug, 2019)
White House proposal would have FCC and FTC police alleged social media censorship - CNN (Aug, 2019)
UN probing 35 North Korean cyberattacks in 17 countries (2019-08-20)
UNIT 42 PLAYBOOK VIEWER: Threatr Actor Intel (TTP's)
NotPetya an 'act of war,' cyber insurance firm taken to task for refusing to pay out (Jan 2019)
Delta Sues Vendor Inc for Causing Data Breach (Aug 2019)
Facebook and Twitter say China has been spreading disinformation in Hong Kong. "For us in the security industry, this is really the first time we've seen China really go this overt," says @TrustedSec CEO @HackingDave. (2019-08-21)
Ch 2a: Former Equifax CEO Blames One IT Guy for Massive Hack
The Recent U.S. Policy Towards China Is Productive | IQ2US Debates (Aug, 2019)
Recode Decode: CDA 230: The US law that shaped the internet, explained (and debated)
Can the Chinese government now get access to your Grindr profile? (Jan 2019)
Grindr Is Owned by a Chinese Firm, and the U.S. Is Trying to Force It to Sell (Mar. 2019)
China's Kunlun Tech agrees to U.S. demand to sell Grindr gay dating app (May 2019)
Ch 2b: The reality of implementing ISO 27001 - IT Governance USA Blog
Ch 2c: Pricing & Options for ISO 27001 and ISO 22301 Documentation
Successfully Countering Russian Electoral Interference | Center for Strategic and International Studies
The China hawk who captured Trump's 'very, very large brain'
A China Hawk Gains Prominence as Trump Confronts Xi on Trade
Ch 3a: Top 10 Governance, Risk and Compliance (GRC) Vendors
The Cyber Threat from Iran after the Death of Soleimani (Feb 2020)
2020-10-03: 9 Tips for CISM Exam Success [Updated 2019]
2020-10-15: Recommended Mandiant and FireEye Blogs
CafePress-Complaint

12-5-20 2:51 pm