IST456 Fall 2011 Security Management http xkcd com538
- Slides: 26
IST-456 Fall 2011 Security Management http: //xkcd. com/538/
Objectives • understand issues, techniques and technologies for security management • discuss system vulnerabilities and mitigation strategies • understand role of security inspections, certification and accreditation • Understand interactions between systems design, systems management, social factors and socio-political environment as pertains to security management • Basic understanding of emerging ISO/IEC 27000 (ISMS) standards http: //www. freefoto. com/preview/04 -07 -9/CCTVSecurity-Camera
Your Instructor Dr Gerry Santoro • Founding Assoc. Prof. of IST • 25+ years IT, network and security experience • 301 -J IST Building • (814) 571 -8306 (SMS is OK)
About your instructor • Research Interests: – Cyber-crime, security management, cyber-warfare – Computer-Mediated Communications – Popular Culture and Technology 4
About your instructor • • Married (Suzi) 4 kids (Gerald, Travis, Brandi, Kelsey) Hobbies: Motorcycles, Guitar, Astronomy, Aikido (2’nd Dan) Advisor to: SRA Club, IST Interest House, Penn State Aikido Club 5
Teaching/Learning Assistants TA: • Adan Ortiz-Cordova LA: • Timothy Sangjun Woo http: //www. freefoto. com/preview/22 -32 -5/RAF-Falcons-Parachute-Display-Team
Syllabus • Located on Angel • read it carefully! • make note of due dates! • contains • list of sessions • list of readings • quiz dates • due dates http: //www. openclipart. org/detail/89995/stack-of-books-01 -byanonymous
Readings • Michael E. Whitman and Herbert. Mattord, “Management of Information Security” Third Edition ISBN-13: 978 -1 -4354 -8884 -7 • Other required readings will be assigned • Optional readings will also be provided http: //www. openclipart. org/detail/89995/stack-of-books-01 -byanonymous
Topics • Introduction to Management of Information Security • Planning for Contingencies • Information Security Policy • Developing the Security Program • Security Management Models • Security Management Practices
Topics (cont. ) • Risk Management • Vulnerabilities and Threats • Protection Mechanisms • Personnel and Security • Law and Ethics
Content of the topics • There will also be other (online) required readings and occasional news items – These will be listed in the Syllabus and on Angel • Class meetings will include a weekly summary of current security and security management news and issues – It is important that the information security manager be aware of recent developments, attacks, vulnerabilities, etc. • I will post important Web links at www. delicious/gmsantoro/456 -fall-tags – News articles, journals, documents, resources, etc. 11
Emphasis of IST-456 is on MANAGEMENT of security • Methods, techniques, standards, approaches, best practices etc. • Goal is to control risk • Perhaps largest IT-related challenge for 21’st Century • Job outlook is very positive • Most problems with security come down to how it is managed This is as much an art as it is a science!
Course Policies • During lectures you are not allowed to use classroom computers, cell phones, i. Pods, i. Pads or other technology If you need these due to a documented learning disability please see me Time will be given during class for team and individual use of these technologies • Late assignments/labs will receive a 20% penalty unless prior approval is given
Course Policies • If you have a disability and require special assistance please see me I will only require documentation in case of need for use of assistive technology • Course-related communication must use Angel However you are free to call me or SMS me in the case of an emergency or simple question You are also welcome to stop by my office during office hours or any other time I am there I promise to read Angel daily and respond within 1 business day if not sooner
Integrity • You are required to abide by the Penn State Policy on Academic Integrity As posted in the syllabus • You are required to abide by the Penn State policy on nondiscrimination and respect Please respect each other – everyone has something to contribute although skill levels may vary
Attendance • Attendance is required and is factored into your final grade. Attendance policy: Planned absence – notify ‘all course faculty’ using Angel before the absence Unplanned absence – notify ‘all course faculty’ using Angel as soon as technically possible! If you follow the attendance policy you will be excused and allowed to make up missed work http: //xkcd. com/140/
Other Nuggets • Class meeting slides will be available on Angel Extra credit will be provided, although the nature and amount of that credit will not be determined until sometime during the semester
Deliverables • Quizzes (individual) (35%) 350 points • Mini-Problems and Exercises (team) (45%) 450 points • Security News Presentation (Team) (10%) 100 points • Self and Team Evaluation and Participation (10%) 100 points Total (100%) 1000 points
Quizzes (35%) • There will be 8 quizzes this semester The lowest quiz score will be dropped for each student • Quizzes will be administered in class Quiz dates are listed in the syllabus • Quizzes will cover required readings, material covered in class, and labs • The format will be multiple-choice, truefalse, and short answer • Your goal is to select or provide the BEST answer based on course material! Beware of semantics! • Each quiz will include one free question http: //www. openclipart. org/detail/137011/simple-questionsign-by-boobaloo
Mini Problems and Exercises (45%) • Three team projects 15% each) • You will be provided with some initial resource or information • article, Web site, situation problem, video, etc. • Team will produce report essay (with references) providing analysis and answering questions http: //www. openclipart. org/detail/85003/computer-rage-byeady
Security News Presentation (10%) • Team project • Research an incident, methodology, approach, technology or other issue/technique in security news • Develop outline and presentation materials for 5 -8 minute presentation and present to class http: //www. openclipart. org/detail/131587/news paper-icon-by-jhnri 4 • Be sure to relate it to Security Management and course content
Any questions on Syllabus? • Get familiar with ANGEL • Use ANGEL to read/send emails via the Communicate Tab in ANGEL • Team space will be provided • Find where the components are located • Read the syllabus and project descriptions • http: //www. openclipart. org/detail/50287/%C 3 %89 l%C 3%A 8 ve-posant-une-question-/student-asking-a-question-by-lmproulx • You are responsible for knowing the information provided in the syllabus! (due dates, readings, etc. ) Look over the team problem descriptions
Tips for Success Use a personal calendar to plan your semester Stay on top of the readings Attend all classes – have short meetings with your team after class time Be sure to retrieve your graded quizzes and labs Contact Dr. Santoro or one of the assistants if you have any questions of problems http: //www. flickr. com/photos/buschap/2224160715/sizes/m/in/p hotostream/
We want you to succeed! Your success is our success! Use the course as a launch pad for exploration Be careful not to do anything that breaks the law or Penn State Policy! http: //www. publicdomainpictures. net/viewimage. php? image=5520&picture=thumbs-up
Team cards • each student takes one index card • on card put your name and Penn State access ID • If you wish to be on a team with another student, hand in card WITH their card • If there is a student that you do NOT wish to be on a team with – send me that info by 6 pm today on Angel email • Teams will have 6 -7 students • I will TRY to follow your wishes • Teams may adjust until end of drop/add
Questions? End of class 1
- Security private
- Xkcd security
- Johnny tables xkcd
- Sciencespot.net
- T.trimpe 2003 http //sciencespot.net/ answers
- Http//sciencespot.net
- Xkcd adhd
- Http //mbs.meb.gov.tr/ http //www.alantercihleri.com
- Siat.ung.ac.id
- Customer experience management conference 2010
- Osi standard for security architecture is
- Security guide to network security fundamentals
- Wireless security in cryptography and network security
- Visa international security model diagram
- Electronic mail security in network security
- Cnss security model 27 cells example
- Integrity in e commerce
- Building security software
- Security guide to network security fundamentals
- Security guide to network security fundamentals
- Xkcd 208
- Xkcd time machine
- Xkcd scientific method
- How to hack pbis rewards
- Xkcd
- Xkcd
- High level languages