Optional |
CNIT 160: Cybersecurity ResponsibilitiesSpring 2022 Sam BowneSchedule · Lectures
|
Required |
Catalog DescriptionExplores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime. Student Learning OutcomesUpon completion of this course, a student will be able to: Textbook"CISM Certified Information Security Manager All-in-One Exam Guide 1st Edition" by Peter H. Gregory QuizzesThe quizzes are multiple-choice, online, and open-book. However, you may not ask other people to help you during the quizzes. You will need to study the textbook chapter before the lecture covering it, and take the quiz before that class. Each quiz is due 30 min. before class. Each quiz has 5 questions, you have ten minutes to take it, and you can make two attempts. If you take the quiz twice, the higher score counts. Presentations and PapersEach student must make two in-class Presentations and write two Papers. Topics must be submitted in advance. Discussion BoardEach CCSF student must contribute to the Discussion Board in Canvas. There are dates listed in the schedule with Discussion assignment due. For questions, please send a message in Canvas or email CNIT.160@gmail.com |
Optional Books |
Schedule (may be revised) | ||||
---|---|---|---|---|
Thu 1-20 | 1 Becoming a CISM & Cyberwar
| |||
Thu 1-27 | Quizzes: Ch 1 & 2a * | 2a Information Security Governance Pages 16-55, ending at Security Strategy Development
| ||
Thu 2-3 | Quiz: Ch 2b *
Discussion 1 * |
2b Information Security Governance Pages 55-102, beginning at Security Strategy Development
| ||
Thu 2-10 | Quiz: Ch 3a *
Topic 1 Due (5 pts) * Discussion 2 * |
3a Information Risk Management p. 102 - 115 Topics:
|
||
Thu 2-17 | No Quiz |
| ||
Thu 2-24 | Quiz: Ch 3b Early Presentation 1 (+10) Discussion 3 |
CNIT Job Fair 5-7 pm
Zoom CNIT 160 starts at 7 pm 3b Information Risk Management p. 114 - 125 Topics:
| ||
Thu 3-3 | Presentation 1 (50 pts) | Student Presentations
| ||
Thu 3-10 | Discussion 4 | 3c Information Risk Management p. 125 - 158 Topics:
| ||
Thu 3-17 | Quiz: Ch 3c & 3d Discussion 5 |
3d Information Risk Management p. 158 - 182 Topic:
| ||
Thu 3-24 | No Quiz |
| ||
Thu 3-31 | Holiday: No Class | |||
Thu 4-7 | Quiz: Ch 4a
Topic 2 due Discussion 6 |
4a Information Security Program Development and Management
|
||
Thu 4-14 | No Quiz Paper 1 due (50 pts) |
| ||
Thu 4-21 | Quiz: Ch 4b Discussion 7 Early Presentation 2 (+10) |
4b Information Security Program Development and Management
| ||
Thu 4-28 | No Quiz
Presentation 2 (50 pts) |
|||
Thu 5-5 | Quiz: Ch 4c Discussion 8 Paper 2 due (50 pts) |
4c Information Security Program Development and Management
| ||
Thu 5-12 | No Quiz
|
Last Class: No New Material
| ||
Wed 5-18 - Wed 5-25 |
Final Exam available online throughout the week. You can only take it once. | |||
All quizzes due 30 min. before class * No late penalty until 2-17 |
Links |
---|
Radix Economic Model (1-31-19) 60% of small companies that suffer a cyber attack are out of business within six months. Larry Diamond talks Russia, China, "Ill Winds" on Kara Swisher podcast (Aug, 2019) North Korea stole $2 billion from banks (SWIFT attacks) and cryptocurrency exchanges for its nuclear weapons program (ty @violetblue) (Aug, 2019) White House proposal would have FCC and FTC police alleged social media censorship - CNN (Aug, 2019) UN probing 35 North Korean cyberattacks in 17 countries (2019-08-20) UNIT 42 PLAYBOOK VIEWER: Threatr Actor Intel (TTP's) NotPetya an 'act of war,' cyber insurance firm taken to task for refusing to pay out (Jan 2019) Delta Sues Vendor Inc for Causing Data Breach (Aug 2019) Facebook and Twitter say China has been spreading disinformation in Hong Kong. "For us in the security industry, this is really the first time we've seen China really go this overt," says @TrustedSec CEO @HackingDave. (2019-08-21) Ch 2a: Former Equifax CEO Blames One IT Guy for Massive Hack The Recent U.S. Policy Towards China Is Productive | IQ2US Debates (Aug, 2019) Recode Decode: CDA 230: The US law that shaped the internet, explained (and debated) Can the Chinese government now get access to your Grindr profile? (Jan 2019) Grindr Is Owned by a Chinese Firm, and the U.S. Is Trying to Force It to Sell (Mar. 2019) China's Kunlun Tech agrees to U.S. demand to sell Grindr gay dating app (May 2019) Ch 2b: The reality of implementing ISO 27001 - IT Governance USA Blog Ch 2c: Pricing & Options for ISO 27001 and ISO 22301 Documentation Successfully Countering Russian Electoral Interference | Center for Strategic and International Studies The China hawk who captured Trump's 'very, very large brain' A China Hawk Gains Prominence as Trump Confronts Xi on Trade Ch 3a: Top 10 Governance, Risk and Compliance (GRC) Vendors The Cyber Threat from Iran after the Death of Soleimani (Feb 2020) 2020-10-03: 9 Tips for CISM Exam Success [Updated 2019] 2020-10-15: Recommended Mandiant and FireEye Blogs CafePress-Complaint
|