CSC 483 Advanced Computer And Network Security (Online)

2y ago
5 Views
1 Downloads
1.09 MB
22 Pages
Last View : 28d ago
Last Download : 3m ago
Upload by : Ronnie Bonney
Transcription

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyCSC 483 Advanced Computer and Network Security (Online)Online CommentsThis is an online course. The following information is very important. CSC 4012 is the first course in theCNSS 4012 certification process. An awareness of the materials is the goal. You will be responsible for anumber of readings and Cyber Security Training modules (seehttp://www.teexwmdcampus.com/index.k2?locRef 1) . The workload is reasonable but continuous. I willnot accept any late submissions and you are expected to follow instructions.If you have questions, contact me at once (see contact information below). If you have trouble withBlackBoard or using the Hampton University intranet system, contact me immediately.Course DescriptionIntroduction to security problems in computing and networking. Information Security Models.Encryption and decryption techniques. Cryptographic protocols and practices. Operations Security.Program Security. Security in networks and distributed systems. Database Security. Electroniccommerce security. Legal and ethical issues in computer and network security. Prerequisite: CSC 382 orConsent of the Chair.INSTRUCTOR: Mr. Robert A. Willis Jr.Office: ST 120 Telephone: 757-727-5556Office Hours: MWF 9:00 – 11:00 TR11:00 – 1:00Contact: E-Mail: robert.willis@hamptonu.edu Skype: rwjr1944 Twitter: rwjr1944Course ObjectivesDesign, implementation, and analysis of computer and network security. This courses provides thefoundation for understanding the key issues association with assessing information security model,1

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacyprotecting computer and network resources, examining existing cryptographic protocols and designingnew cryptographic protocols, studying operation security, analyzing security for operating systems andprograms, implementing secure database and e-commerce systems. After completing the courses,students would be able to Identify and prioritize threats to computer and network resources.Identify and prioritize information security models.Identify and implement encryption and decryption techniques.Identify and design cryptographic protocols.Define the factors of operation security.Identify and define the factors of secure operating systems and programs.Identify and define the factors of secure database systems.Define and design secure e-commerce systems.Describe ethics, legal, and public relations implications of computer and network security.Minimum CompetenciesStudents meeting minimum competencies should expect to receive a grade between 74% and 77%.Minimum competencies for this course are as follows: Identify and prioritize threats to computer and network resources.Identify and prioritize information security models.Identify and implement encryption and decryption techniques.Identify and design cryptographic protocols.Define the factors of operation security.Identify and define the factors of secure operating systems and programs.Describe ethics, legal, and public relations implications of computer and network security.Course TopicsThis course will cover most of the information assurance concepts including: Introduction to Computer and Network Security (6 hours)Information Security Model (3 hours)Encryption and Decryption (6 hours)Cryptographic Protocols (6 hours)Operation Security (3 hours)Operating Systems and Program Security (3 hours)Database and E-commerce Security (3 hours)Legal, Ethical, and Professional Issues in Computer and Network Security (3 hours)Laboratory (12 hours)Mapping to CNSSI 4012 can be found here.2

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyTextbooks:Required: (Pfleeger) Security in Computing, 4th edition (or the newest), C. P. Pfleeger, S. L. Pfleeger,Prentice Hall, 2003.Reference: (Whitman) Principle of Information Security, 3rd edition, Michael E. Whitman & Herbert J.Mattord, Thomson, 2005. (Krutz) The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, 2nd edition, Ronald L.Krutz and Russell Dean Vines, Wiley, 2004.Supplemental Materials (SM): SM-1: TEMPESTSM-2: NSA-TEMPEST-A Signal ProblemSM-3: NSTISSM TEMPEST 2-95SM-4: Information Leakage from Optical EmanationsSM-5: NIST SP 800-12 An Introduction To Computer Security-The NIST HandbookSM-6: NIST SP 800-13 Telecommunications Security Guidelines for TelecommunicationsManagement Network SM-7: A Model for Information Assurance: An Integrated Approach SM-8: DOE-Cyber Security Process Requirements ManualTentative Course OutlineWeek1Text chapters (See 4012map for the details)SupplementalMaterialsTests / ProgramsPfleeger: Ch1, Ch8SM-5, SM-6HW-11.6 Threat/Attack/Vulnerability (SM-8)Pfleeger: Ch1, Ch2, Ch4SM-1, SM-2, SM3, SM-4, SM-8HW-21.7 TheftKrutz: Ch2, Ch9, Ch12,Topics1. Introduction to Computer and Network Security1.1 Computer Systems1.2 Wired Network1.3 Wireless Network1.4 Connectivity (SM-5, SM-6)1.5 Protocols23

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy1.8 TEMPEST (SM-1, SM-2, SM-3, SM-4)Appendix1.9 CountermeasuresWhitman: Ch2, Ch4, Ch91.10 Threat Analysis/Assessment3LABORATORY42. Information Security ModelWhitman: Ch1SM-7HW-32.1 NSTISSC Security Model2.2 Information Security Model (SM-7)563. CryptographyPfleeger: Ch2, Ch10,3.1 EncryptionWhitman: Ch83.2 DecryptionPfleeger: Ch2, Ch10HW-4HW-5Whitman: Ch8783.3 Key Exchange ProtocolsPfleeger: Ch2, Ch103.4 Digital SignatureWhitman: Ch83.5 Hash FunctionsPfleeger: Ch2, Ch103.6 Access ControlWhitman: Ch8HW-6HW-73.7 PKI9LABORATORY104. Operation SecurityKrutz: Ch6115. Operating Systems and Program SecurityPfleeger: Ch3, Ch4, Ch5HW-5Pfleeger: Ch8HW-65.1 Operating Systems Security5.2 Program Security12LABORATORY136. Database and E-Commerce Security6.1 Database Security6.2 E-Commerce Security4

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy147. Legal, Ethical, and Professional Issues inComputer and Network SecurityPfleeger: Ch9HW-7Whitman: Ch315LABORATORYImportant Dates:Exam 1:Exam 2:Final Exam:The following information applies to all students in the School of Science:In addition to the minimum grade requirements established by Hampton University, all majors within theSchool of Science must pass all required courses offered within the School of Science with a grade of “C”or better in order to satisfy degree requirements. The minimum grade requirement is in effect for allscience courses taken during Fall 2001 and beyond.Course Assignment and Calendar:Homework Assignments: There are two types of homework assignments: problems and projects. Both ofthem will be issued and specified with their due date in Blackboard. Problems will be used to evaluate theunderstanding of course materials and projects will be used to evaluate the complexity of algorithm studiedin class. All of the projects must be implemented by Java in Unix/Linux environments. Late work will not beaccepted and will be counted as zero.Final Exam: The exam will be given on the date scheduled by the registrar. The exam will becomprehensive. There are no exemptions from the exam.Attendance: The attendance policy of Hampton University will be observed. You are expected to attendall classes and to arrive on time. Your attendance and participation will be 10% of the final grade. Morethan 7 absences will constitute a failing grade, regardless to other considerations.Writing-Across-The-Curriculum: Hampton University adopts the policy in all courses of “writingacross the curricula”. In this course, the objectives will be achieved by homework assignments, programcomments, and various tests.5

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyThe Ethics Paper: Details about the ethics paper will be provided at least one month prior to thedue date. The ethics paper will be graded based on the criteria listed in “Hampton UniversityScoring Rubric”.Grades: The final grade of this course will be determined by the combined weight of followingcomponents:Examination (2)20 %Homework (10)40 %Laboratory (3)15%Ethics Paper5%Final exam20 %Course grades will follow the scale of the university grading system:A 98-100A94-97A-90-93B 88-89B84-87B-80-83C 78-79C74-77C-70-736

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyD 68-69D64-67D-60-63FBelow 60Make-Up Policy: No make-up tests will be given without pervious arrangements, a written medicalexcuse, or an emergency approved by appropriate university official.Policy on Electronic Devices: Any electronic device (i.e. cell phone, PDA, pagers, etc.) will be turnedoff during class. During any test or final, these devices will not be allowed at the test.Policy on Academic Dishonesty: Please see page 29 of the Student Handbook.Cheating: A student caught cheating on an examination or plagiarizing a paper which forms a part of acourse grade shall be given an "F" in the course and will be subject to dismissal from the University, Astudent is considered to be cheating if, in the opinion of the person administering an examination (writtenor oral), the student gives, seeks, or receives aid during the process of the examination; the student buys,sells, steals, or otherwise possesses or transmits an examination without authorization; or, the studentsubstitutes for another or permits substitution for himself/ herself during an examination. All cases ofcheating shall be reported by the instructor to the chair of the department in which the cheating occurred,to the school dean/division director and to the Provost.No penalty shall be imposed until the student has been informed of the charge and of the evidence uponwhich it is based and has been given an opportunity to present his/her defense. If the faculty member andthe student cannot agree on the facts pertaining to the charge, or if the student wishes to appeal a penalty,the issue may be taken to the department chair. Each party will present his/her case to the chair who shallthen call a meeting of all involved parties. If the issue is not resolved at the departmental level, the deanshall conduct a hearing. If the issue is not resolved at the school level either party may appeal the decisionat the school level to the Provost who shall convene the appropriate individuals and conduct a hearing inorder to resolve the issue.Plagiarism: Plagiarism is defined as "taking and using as one's own the writing or ideas of another." Allmaterials used to meet assigned written requirements of a course, from any source, must be given propercredit by citing the source. A student caught plagiarizing a paper which forms a part of a course gradeshall be given an "F" in the course and will be subject to dismissal from the University.PENALTIES FOR ACADEMIC DISHONESTY7

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyCases of academic dishonesty are initially investigated and reported by members of the instructionalfaculty to the chairperson of the department in which the cheating occurred, to the school dean, divisiondirector and to the Provost. Also, penalties for minor violations of academic dishonesty are to berecommended at the discretion of the instructor. The penalties for academic dishonesty on examinationsand major course requirements may include one of the following:1.2.3.A grade of "F" on the examination or project.A grade of "F" on the examination or project and dismissal from the course.A grade of “F” on the examination or project, dismissal from the course and from theUniversity.When dismissal from the University is the recommended penalty, the chairman of the department submitsthe details of the case to the Provost who schedules a hearing.ADMINISTRATIVE ACTIONThe Provost has the authority to dismiss or expel any student who fails to meet scholarship requirements orto abide by academic regulations.Dress Code:This code is based on the theory that learning to select attire appropriate to specific occasions andactivities is a critical factor in the total educational process. Understanding and employing the HamptonUniversity Dress Code will improve the quality of one’s life, contribute to optimum morale, and embellishthe overall campus image. It also plays a major role in instilling a sense of integrity and an appreciationfor values and ethics as students are propelled towards successful careers.Students will be denied admission to various functions if their manner of dress is inappropriate. On thispremise students at Hampton University are expected to dress neatly at all times. The following areexamples of appropriate dress for various occasions:1.2.3.4.5.Classroom, Cafeteria, Student Union and University Offices – causal attire that is neat andmodest.Formal programs in Ogden Hall, the Convocation Center, the Student Center Ballroom, the LittleTheater and the Memorial Chapel – event appropriate attire as required by the eventannouncement.Interviews – Business attire.Social/Recreational activities, Residence hall lounges (during visitation hours) – casual attire thatis neat and modest.Balls, Galas, and Cabarets – formal, semi-formal and after five attire, respectively.Examples of inappropriate dress and/or appearance include but not limited to:8

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy1.2.3.4.5.6.7.8.9.Do-rags, stocking caps, skullcaps and bandannas are prohibited at all times on the campus ofHampton University (except in the privacy of the student’s living quarters).Head coverings and hoods for men in any building.Baseball caps and hoods for women in any building.a. This policy item does not apply to headgear considered as a part of religious or culturaldress.Midriffs or halters, mesh, netted shirts, tube tops or cutoff tee shirts in classrooms, cafeteria,Student Union and offices;Bare feet;Short shirts;Shorts, all types of jeans at programs dictating professional or formal attire, such as Musical Arts,Fall Convocation, Founder’s Day, and Commencement;Clothing with derogatory, offensive and/or lewd message either in words or pictures;Men’s undershirts of any color worn outside of the private living quarters of the residence halls.However, sports jerseys may be worn over a conventional tee-shirt.Procedure for Cultural or Religious Coverings1.2.3.Students seeking approval to wear headgear as an expression or religious or cultural dress maymake a written request for a review through the Office of the Chaplain.The Chaplain will forward his recommendation the Dean of Students for final approval.Students that are approved will then have their new ID card picture taken by University Policewith the headgear being worn.All administrative, faculty and support staff members will be expected to monitor student behaviorapplicable to this dress code and report any such disregard or violations to the Offices of the Dean or Men,or Dean of Women for the attention of the Dean of Students.CODE OF CONDUCTJoining the Hampton Family is an honor and requires each individual to uphold the policies, regulations, andguidelines established for students, faculty, administration, professional and other employees, and the laws ofthe Commonwealth of Virginia. Each member is required to adhere to and conform to the instructions andguidance of the leadership of his/her respective area. Therefore, the following are expected of each memberof the Hampton Family:1.2.3.4.5.6.To respect himself or herself.To respect the dignity, feelings, worth, and values of others.To respect the rights and property of others and to discourage vandalism and theft.To prohibit discrimination, while striving to learn from differences in people, ideas, and opinions.To practice personal, professional, and academic integrity, and to discourage all forms of dishonesty,plagiarism, deceit, and disloyalty to the Code of Conduct.To foster a personal professional work ethic within the Hampton University Family.9

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy7.8.To foster an open, fair, and caring environment.To be fully responsible for upholding the Hampton University Code.Students with disabilities which require accommodations should (1) register with the Officeof Testing Services and 504 Compliance to provide documentation and (2) bring thenecessary information indicating the need for accommodation and what type ofaccommodation is needed. This should be done during the first week of classes or as soon asthe student receives the information. If the instructor is not notified in a timelymanner, retroactive accommodations may not be provided.DISCLAIMERThis syllabus is intended to give the student guidance in what may be covered during the semester and willbe followed as closely as possible. However, the professor reserves the right to modify, supplement and makechanges as course needs arise.10

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyHampton University Scoring RubricThe Hampton University Advisory Council of the Writing Program has approved and recommended the use ofthe scoring rubric as a guide for evaluating student-writing performance across the curriculum.6A paper in this category: States purpose (e.g., position or thesis) insightfully, clearly and effectively Provide thorough, significant development with substantial depth and persuasively marshals supportfor position Demonstrates a focused, coherent, and logical pattern of organization Displays a high level of audience awareness Use disciplinary facts critically and effectively Has support control of diction, sentence structure, and syntactic variety, but may have a few minorflaws in grammar, usage, punctuation, or spelling Documents sources consistently and correctly using a style appropriate to the discipline5A paper in this category: States purpose (e.g., position or thesis) clearly and effectivelyProvide development with some depth and complexity of thought and supports position convincinglyDemonstrates effect pattern of organizationDisplays a clear sense of audience awarenessUse disciplinary facts effectivelyHas good control of diction, sentence structure, and syntactic variety, but may have a few minorerrors in grammar, usage, punctuation, or spelling Documents sources correctly using a style appropriate to the discipline4A paper in this category: States purpose (e.g., position or thesis) adequatelyProvides competent development with little evidence of complexity of thoughtDemonstrates an adequate pattern of organizationDisplays some degree of audience awarenessUses disciplinary facts adequately11

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy Has adequate control of diction, sentence structure, and syntactic variety, but may have some error ingrammar, usage, punctuation, or spelling Documents sources adequately using a style appropriate to the discipline3A paper in this category: States purpose (e.g., position or thesis) but with varying degree of clarityProvides some development for most ideasDemonstrates some pattern of organization, but with some lapses from the patternDisplays uneven audience awarenessUses some disciplinary factsHas some control of diction, sentence structure, and syntactic variety, but may have frequent error ingrammar, usage punctuation, or spelling Documents sources using a style appropriate to the discipline, but may have errors.2A paper in this category: States purpose (e.g., position or thesis) unclearlyProvides inadequate development of thesisDemonstrates inconsistent pattern of organizationDisplays very little audience awarenessUses disciplinary facts ineffectivelyHas little control of diction, sentence structure, and syntactic variety, and may have a pattern oferrors in grammar, usage, punctuation, or spelling Acknowledges sources but does not document them using a style appropriate to the discipline1A paper in this category: Fails to state purpose (e.g., position or thesis)Fails to develop most ideasLacks a pattern of organizationDisplays no audience awarenessUse few or no disciplinary factsLakes control of diction, sentence structure, and syntactic variety, with a pattern of errors ingrammar, usage, punctuation, or spelling12

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy Fails to document or acknowledge sources13

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyMapping to NSTISSI 4012 StandardCourse Review Sheet for CNSS No. 4012 StandardCSC583KrutzWhitmanPfleegerDiscuss threats/attacks tosystemsTopic 1.6Ch1, Pg. 28 (Terms andDefinitions), Ch2, Pg. 61-68(Access Control Attack), Ch6,Pg. 373 (Threats andVulnerabilities), Ch12, Pg.593-596 (Initial RiskEstimation), Appendix D, Pg.954-956 (Types and Classes ofAttack), Appendix D, Pg. 983(Threat Identification)Ch2, Pg. 40-63(Threats), Pg.63-73 (Attacks)Ch1, Pg. 5-6(Threats,Vulnerabilities,and Controls)Explain the importance ofthreats/attacks on systemsTopic 1.6Ch2, Pg. 61-68 (AccessControl Attack), Ch6, Pg. 373(Threats and Vulnerabilities),Ch12, Pg. 593-596 (Initial RiskEstimation), Appendix D, Pg.954-956 (Types and Classes ofAttack), Appendix D, Pg. 983(Threat Identification)Ch2, Pg. 40-63(Threats), Pg.63-73 (Attacks)Ch1, Pg. 5-6(Threats,Vulnerabilities,and Controls)Topic 1.6Ch12, Pg. 594 (Threat-SourceIdentification), Appendix D,Pg. 983 (Threat Identification)Ch2, Pg. 59-60(Forces ofNature)Ch8, Pg. 538541 (NaturalDisasters)FUNCTION TWO - GRANTREVIEWACCREDITATIONReviewing the accreditationdocumentation to confirmthat the residual risk iswithin acceptable limits foreach network and/or iscussenvironmental/naturalthreats14Supplemental

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy3Human ThreatsExplain the importance ofintentional and unintentionalhuman threats4Topic 1.6Ch6, Pg. 374 (Illegal ComputerOperations and IntentionalAttacks), Ch12, Pg. 594-596(Human Threat-Sources),Appendix D, Pg. 983 (ThreatIdentification)Ch2, Pg. 42-43(Acts of HumanError orFailure)Ch8, Pg. 541543 (HumanVandals)Topic 1.7Ch6, Pg. 374 (Illegal ComputerOperations and IntentionalAttacks)Ch2, Pg. 54(Deliberate Actsof Theft)Ch8, Pg. 541543 (Theft)Explain threatTopic 1.6Ch1, Pg. 28 (Terms andDefinitions), Ch6, Pg. 373(Threats and Vulnerabilities),Ch12, Pg. 593-596 (Initial RiskEstimation), Appendix D, Pg.983 (Threat Identification)Ch2, Pg. 40-63(Threats)Ch1, Pg. 5-6(Threats,Vulnerabilities,and Controls)Explain the importance oforganizational threatsTopic 1.6Ch1, Pg. 28 (Terms andDefinitions), Ch6, Pg. 373(Threats and Vulnerabilities),Ch12, Pg. 593-596 (Initial RiskEstimation), Appendix D, Pg.983 (Threat Identification)Ch2, Pg. 40-63(Threats)Ch1, Pg. 5-6(Threats,Vulnerabilities,and Controls)Topic 1.10Ch2, Pg. 68-69 (PenetrationTesting), Ch12, Pg. 593 (InitialRisk Estimation), Pg. 597(Threat Likelihood ofOccurrence), Pg. 597-600(Analyzing for Vulnerabilities),Appendix D, Pg. 984 (ControlAnalysis)Topic 1.10Ch12, Pg. 593 (Initial RiskEstimation)Ch4, Pg. 133134 (Identifyand PrioritizeThreats)Topic 1.9Ch1, Pg. 42-45 (SecurityAwareness)Ch5, Pg. 206209 (SecurityEducation,Training, andAwarenessTheftExplain the importance oftheft56ThreatThreat AnalysisExplain the importance ofthreat analysis7DOE-Cyber SecurityProcessRequirementsManualCh7, Pg. 425428 (SecurityThreat Analysis)Threat AssessmentExplain the importance ofthreat assessmentB.COUNTERMEASURES1Education, Training, andAwareness asCountermeasuresExplain the importance ofeducational training, andawareness ascountermeasures15Ch7, Pg. 425428 (SecurityThreat Analysis)A Model forInformationAssurance: AnIntegrated Approach

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyProgram)Ensure educational training,and awarenesscountermeasures areimplemented23C.1Topic 1.9Ch1, Pg. 42-45 (SecurityAwareness)Ch5, Pg. 206209 (SecurityEducation,Training, andAwarenessProgram)Explain the importance ofprocedural/administrativecountermeasuresTopic 1.9Ch6, Pg. 354-356(Administrative Controls)Ch11, Pg. 492498(EmploymentPolicies andPractices)Ch8, Pg. 529538(OrganizationSecurity res areimplementedTopic 1.9Ch6, Pg. 354-356(Administrative Controls)Ch11, Pg. 492498(EmploymentPolicies andPractices)Ch1, Pg. 25(Policies andProcedures)ProceduralCountermeasuresTechnical CountermeasuresExplain the importance ofautomatedcountermeasures/deterrentsTopic 1.9Ch1, Pg. 22-25(Methods ofDefense)Explain the importance oftechnicalcountermeasures/deterrentsTopic 1.9Ch1, Pg. 22-25(Methods ofDefense)Ensure technical/automatedcountermeasures/deterrentsare implementedTopic 1.9Ch1, Pg. 22-25(Methods ofDefense)VULNERABILITYVulnerabilityExplain vulnerability2Ch1, Pg. 28 (Terms andDefinitions), Ch6, Pg. 375-376(Vulnerabilities and Attacks),Ch12, Pg. 593 (Initial RiskEstimation)Ch2, Pg. 63(Attacks)Ch1, Pg. 12-19(Vulnerabilities)Topic 1.6Ch12, Pg. 593 (Initial RiskEstimation), Pg. 597(Analyzing for Vulnerabilities),Appendix D, Pg. 984(Vulnerability Identification)Ch4, Pg. 138139(VulnerabilityIdentification),Ch8, Pg. 509513 (Step 2:DetermineVulnerabilities)Vulnerability AnalysisExplain the importance ofvulnerability analysis3Topic 1.6Network Vulnerabilities16A Model forInformationAssurance: AnIntegrated Approach

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyExplain the importance ofnetwork vulnerabilities4Topic 1.6Ch3, Pg. 190-193 (NetworkAttacks and Abuses), Pg. 194201 (Probing and Scanning)Ch7, Pg. 387390 (WhatMakes aNetworkVulnerability),Pg. 426(NetworkVulnerabilities)Topic 1.6Ch6, Pg. 375-376(Vulnerabilities and Attacks),Appendix B, Pg. 937(Technical Vulnerability),Ch12, Pg. 597 (Analyzing forVulnerabilities), Appendix D,Pg. 984 (VulnerabilityIdentification)Ch1, Pg. 12-19(Vulnerabilities)Topic 3.6Ch2, Pg. 55-56 (Rationale)Technical VulnerabilitiesExplain the importance oftechnical vulnerabilitiesFUNCTION THREE VERIFY COMPLIANCEVerifying that eachinformation system complieswith the informationassurance (IA) requirementsC.SECURITYREQUIREMENTS1Access AuthorizationExplain the importance ofaccess authorization2Auditable EventsExplain auditable events3Ch6, Pg. 369-372 (Auditing)AuthenticationExplain authentication4Ch5, Pg. 179(AuthorizedAccess andUsage ofEquipment)Topic 3.1Ch2, Pg. 69 (Identification andAuthentication), Appendix B,Pg. 885 (Authentication)Ch7, Pg. 338(Authentication)Ch6, Pg. 354 (AdministrativeControls)Ch11, Pg. 493494(BackgroundBackground InvestigationsExplain the importance ofbackground investigations17Ch2, Pg. 59(symmetric andAsymmetricEncryptionSystems)

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial LiteracyChecks)5CountermeasuresExplain the importance ofcountermeasures12Appendix B, Pg. 894(Countermeasure/Safeguard)Ch1, Pg. 22-25(Methods ofDefense)A Model forInformationAssurance: AnIntegrated ApproachTopic 3.3Ch4, Pg 271-273 (KeyManagement)NIST SP 800-57Part1Recommendation forKey Management Part 1: General(Revised)Ch6, Pg. 363-364 (Marking)NIST SP 800-18Guide forDeveloping SecurityPlans for FederalInformation SystemsKey ManagementInfrastructureDiscuss key managementinfrastructure13Topic 1.9Information MarkingDiscuss information markingAdministrativeCommunicationsSystem - USDepartment ofEducationNIST SP 80088 rev1 Guide forMedia SanitizationNSA/CSS onDiscuss non-repudiationTopic 3.4Ch3, Pg. 102 (OSI SecurityServices and Mechanisms),Appendix B, Pg. 920(Nonrepudiation)Ch8, Pg. 377(DigitalSignature)Ch7, Pg. 474(Requirementsand Solutions)Explain the importance androle of non-repudiationtopic 3.4Ch3, Pg. 102 (OSI SecurityServices and Mechanisms),Appendix B, Pg. 920Ch8, Pg. 377(DigitalSignature)Ch7, Pg. 474(Requirementsand Solutions)18

Quality Enhancement Plan (QEP): From These Roots A Foundation for Life: Mathematics and Financial Literacy(Nonrepudiation)15Public Key Infrastructure(PKI)Explain the importance androle of PKITopic 3.7Ch4, Pg. 267 (Public-KeyInfrastructure (PKI))Ch8, Pg. 375377 (Public-KeyInfrastructure(PKI))Ch7, Pg. 436438 (PKI andCertificates)Define manual/automatedaccess controlsTopic 3.6Ch2, Pg. 55-61 (AccessControl)Ch4, Pg. 141142 (AccessControl)Ch4, Pg. 194204 (Control ofAccess toGeneral Objects)Explain the importance ofmanual/automated accesscontrolsTopic 3.6Ch2, Pg. 55-61 (AccessControl)Ch4, Pg. 141142 (AccessControl)Ch4, Pg. 194204 (Control ofAccess toGeneral Objects)Explain the importance ofaccess privilegesTopic 3.6Ch2, Pg. 56 (Controls), Pg. 5758 (Models for ControllingAccess), Ch6, Pg. 355-356(Least Privilege), Pg. 361(Privileged-Entity Controls)Ch4, Pg. 141142 (AccessControl)Ch4, Pg. 194204 (Control ofAccess toGeneral Objects)Discretionary AccessControlsTopic 3.6Ch2, Pg. 58 (DiscretionaryAccess Control)Ch4, Pg. 141142 (AccessControl)Discuss discretionary accesscontrolsTopic 3.6Ch2, Pg. 58 (DiscretionaryAccess Control)Ch4, Pg. 141142 (AccessControl)Explain the importance ofdiscretionary access controlsTopic 3.6Ch2, Pg. 58 (DiscretionaryAccess Control)Ch4, Pg. 141142 (AccessControl)FUNCTION FOURENSUREESTABLISHMENT OFSECURITY CONTROLSEnsuring the establishment,administration, andcoordination of security forsystems that agency, service,or command personnel

CNSS 4012 certification process. An awareness of the materials is the goal. You will be responsible for a number of readings and Cyber Security Training modules (see . Information Security Model 2.1 NSTISSC Security Model 2.2 Information Security Model (SM-7) Whitman: Ch1 SM-7 HW-3 5 3. Cry

Related Documents:

9. cot(3 7x) dx; cot u du ln sin u C ln sin(3 7x) C u3 7x du 7 dx ''Äœœœ ” œ kk k k "" "77 7 10. csc( x 1) dx; csc u ln csc u cot u C ux1 du dx ''1 1 1 Äœ œ ” œ † kk du 11 " ln csc( x 1) cot( x 1) Cœ " 1 kk11 11. e csc e 1 d ; csc u du ln csc u cot

To increase the power rating of the CSC without degrading the utilization of power semiconductor devices, a novel multilevel CSC, named the parallel-cell multilevel CSC, is proposed. Based on a six-switch CSC cell, the parallel-cell multilevel CSC has the advantages of high power rating, low harmonics, fast dynamic response and modularity.

§440.150 Intermediate Care Facility Services, Other Than in Institutions for Mental Diseases §483.410 Condition of Participation: Governing Body and Management §483.410(a) Standard: Governing Body §483.410(b) Standard: Compliance With Federal, State and Local Laws. §483.410(c) Standard: Client Records

CSC 8301: Lecture 12 Linear Programming CSC 8301- Design and Analysis of Algorithms Lecture 12 Linear Programming (LP) 4 LP – Shader Electronics Example The Shader Electronics Company produces two products: 1.Eclipse, a portable touchscreen digital player; it takes 4 hours of electronic work and 2 hours in the assembly shop; it sells for a

1 Commonly referred to as the Community Score Card or the CSC by practitioners, this document also uses Score Card interchangeably to refer to the tool and the process. 2 The Community Score Card (CSC): A generic guide for implementing CARE’s CSC process to improve quality of services:

Before a domain transfer to CSC is initiated, or when we are being asked to make updates to domains already under management, we ask you to identify whether the domains are critical to your business. All of the CSC transfers and modification processes are rigid, but if we are made aware of the importance

Operating Systems 12/4/2018 CSC 256/456 1 12/4/2018 CSC 256/456 1 Multiprocessor Operating Systems CS 256/456 Dept. of Computer Science, University of Rochester 12/4/2018 CSC 256/456 2 Multiprocessor Hardware A computer system in which two or more CPUs share full access to the main memory Each CPU might have its own cache and the .

CSC 340L Digital Logic Design Lab (1.5 quarter units) Prerequisite: CSC 331, Corequisite: CSC 340 A study of basic digital logic circuit design and implementation. Circuit schematic development and computer modeling and simulation of digital systems. Experiments explore designs with combinational and sequential logic.