Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

26
Introduction to Introduction to Information Systems Information Systems Security Security CISS 300 Orientation CISS 300 Orientation Summer 2010 Summer 2010

Transcript of Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Page 1: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Introduction to Information Introduction to Information Systems SecuritySystems Security

CISS 300 OrientationCISS 300 Orientation

Summer 2010Summer 2010

Page 2: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Instructor: Buddy SpisakInstructor: Buddy Spisak• Office HoursOffice Hours: Mon. 6:30-7:30 p.m. (June 7 to July 26, 2010): Mon. 6:30-7:30 p.m. (June 7 to July 26, 2010)

• OfficeOffice: BS-143: BS-143

• Voice MailVoice Mail: (916) 568-3100 ext. 14162 or (800) 486-8156 ext. : (916) 568-3100 ext. 14162 or (800) 486-8156 ext. 1416214162

• EmailEmail: : [email protected] The turnaround time for The turnaround time for responding to most emails is about one to two days. Be sure to responding to most emails is about one to two days. Be sure to include your name and the course number in each email so I can include your name and the course number in each email so I can identify who you are and what the email is about.identify who you are and what the email is about.

• Course Web pageCourse Web page: : https://d2l.losrios.edu/

• Instructor Web pageInstructor Web page: : http://crc.losrios.edu/spisakj/

• Microsoft MessengerMicrosoft Messenger: You can also add me to your contact list : You can also add me to your contact list for Windows Messenger. You can use my email address to find for Windows Messenger. You can use my email address to find me.me.

CISS 300CISS 300 22

Page 3: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Course DetailsCourse Details

• Prerequisites: NonePrerequisites: None

• Advisory: NoneAdvisory: None

• Lecture: OnlineLecture: Online

• Accepted for Credit: CSUAccepted for Credit: CSU

• Class Credits: 1 unitClass Credits: 1 unit

CISS 300CISS 300 33

Page 4: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Required Textbook:Required Textbook:

Security Awareness: Applying Practical Security in Security Awareness: Applying Practical Security in Your World, 3ed. Your World, 3ed.

Author:  Mark CiampaAuthor:  Mark CiampaPublisher:  Thompson Course Technology, 2010Publisher:  Thompson Course Technology, 2010ISBN10:  1-4354-5414-6ISBN10:  1-4354-5414-6ISBN13: 978-1-4354-5414-9ISBN13: 978-1-4354-5414-9

CISS 300CISS 300 44

Page 5: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Optional Materials:Optional Materials:

• 3-1/2” floppies or a flash drive to store your work 3-1/2” floppies or a flash drive to store your work for the class.for the class.

CISS 300CISS 300 55

Page 6: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Course Description:Course Description:

• This course provides an introduction to This course provides an introduction to network-based and internet-based security network-based and internet-based security applications and standards. Topics include applications and standards. Topics include cryptography, security protocols, network cryptography, security protocols, network security applications, encryption, hash security applications, encryption, hash functions, digital signatures, viruses and functions, digital signatures, viruses and key exchange.key exchange.

CISS 300CISS 300 66

Page 7: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Student Learning Outcomes Student Learning Outcomes and Course Objectives:and Course Objectives:As a result of completing this course, you will be As a result of completing this course, you will be

able to:able to:• Understand computer and network security issues, Understand computer and network security issues,

including the numerous types of attacks computers are including the numerous types of attacks computers are vulnerable to, the types of attacker profiles, and the vulnerable to, the types of attacker profiles, and the hardware and software defense solutions available. hardware and software defense solutions available.

• Understand concepts such as security goals, the Understand concepts such as security goals, the importance of security, intruder profiles, and defense importance of security, intruder profiles, and defense mechanisms. mechanisms.

• Protect individual personal computers in both the home and Protect individual personal computers in both the home and corporate environments. This includes protecting the single corporate environments. This includes protecting the single device from the threats of data theft, viruses and spyware, device from the threats of data theft, viruses and spyware, techniques of authentication and security patch techniques of authentication and security patch management. management.

CISS 300CISS 300 77

Page 8: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Student Learning Outcomes Student Learning Outcomes and Course Objectives - and Course Objectives - Continued:Continued:• Implement corporate security policy measures involving email, Implement corporate security policy measures involving email,

internet access, passwords, incident response and disaster internet access, passwords, incident response and disaster recovery. recovery.

• Ensure internet security and network security by focusing on the Ensure internet security and network security by focusing on the threats to WAN and LAN networks and learning methods of threats to WAN and LAN networks and learning methods of protecting each type of network. protecting each type of network.

• Unite all of the concepts into a picture of “total security.” While Unite all of the concepts into a picture of “total security.” While each lesson stands alone in terms of the specific topic it each lesson stands alone in terms of the specific topic it presents, the concepts in each lesson overlap with the other presents, the concepts in each lesson overlap with the other lessons. It is difficult to discuss protecting an organizational lessons. It is difficult to discuss protecting an organizational network or even an individual computer without addressing network or even an individual computer without addressing threats from the internet. threats from the internet.

• Apply the above concepts to each particular setting and know Apply the above concepts to each particular setting and know how and why they are adapted from one environment to another. how and why they are adapted from one environment to another.

CISS 300CISS 300 88

Page 9: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Methods of Measuring Methods of Measuring Student Learning Outcomes:Student Learning Outcomes:• You will demonstrate knowledge of network and You will demonstrate knowledge of network and

internet security applications and standards internet security applications and standards through class discussions and achievement on through class discussions and achievement on quizzes and final examination.quizzes and final examination.

• You will demonstrate competence in the You will demonstrate competence in the coursework by completing projects and coursework by completing projects and participating in discussions during the semester.participating in discussions during the semester.

CISS 300CISS 300 99

Page 10: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Student Obligations:Student Obligations:

• It is important that you understand what is It is important that you understand what is expected of you in this course.expected of you in this course.

• Refer to the syllabus if you have any questions.Refer to the syllabus if you have any questions.

CISS 300CISS 300 1010

Page 11: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Attendance:Attendance:

• Since this course is online, only attendance at the Since this course is online, only attendance at the Final on July 17, 2010 is necessary. It’s up to you Final on July 17, 2010 is necessary. It’s up to you to go to the course materials in Desire 2 Learn to go to the course materials in Desire 2 Learn (d2l) and do all of the required work. (d2l) and do all of the required work.

• Typically, each week we will be covering one Typically, each week we will be covering one chapter in your textbook.chapter in your textbook.

• Attendance for the on-campus final exam is Attendance for the on-campus final exam is required. Photo identification is required at the required. Photo identification is required at the time of the exam to verify your identity.time of the exam to verify your identity.

CISS 300CISS 300 1111

Page 12: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Discussions:Discussions:

• I want everyone to take a pro-active approach to I want everyone to take a pro-active approach to learning this material. This includes using the learning this material. This includes using the discussions link to ask questions and also answer other discussions link to ask questions and also answer other students’ questions. I will also post questions each students’ questions. I will also post questions each week that you can answer to further your understanding week that you can answer to further your understanding of the material. I expect two postings each week unless of the material. I expect two postings each week unless otherwise noted.otherwise noted.– You can accomplish this task by asking questions about the You can accomplish this task by asking questions about the

current discussion topic or by responding to existing questions.current discussion topic or by responding to existing questions.– My expectation from you is that you will write at least two- to My expectation from you is that you will write at least two- to

three-sentence responses that add substance to the discussion.three-sentence responses that add substance to the discussion.

• Each discussion item is worth 10 points.Each discussion item is worth 10 points.

CISS 300CISS 300 1212

Page 13: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Projects:Projects:

• We will be spending a lot of time working on We will be spending a lot of time working on activities. There will be six hands-on projects and activities. There will be six hands-on projects and six case projects credited for homework for the six case projects credited for homework for the class. The projects will help reinforce what you are class. The projects will help reinforce what you are learning in each lesson. learning in each lesson.

• You will submit your results into the d2l discussions You will submit your results into the d2l discussions area in order to receive points for that assignment. area in order to receive points for that assignment. On all projects you are expected to do your own On all projects you are expected to do your own work. work.

• You are responsible for making sure that your You are responsible for making sure that your instructor receives your work.instructor receives your work.

• Each project is worth 15 points.Each project is worth 15 points.

CISS 300CISS 300 1313

Page 14: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Quizzes:Quizzes:

• Each week there will be a quiz that will Each week there will be a quiz that will test you on the material covered.test you on the material covered.

– It is open book and open notes.It is open book and open notes.– You can take the quiz multiple times to You can take the quiz multiple times to

improve your score, but be aware that the improve your score, but be aware that the questions may change each time you take questions may change each time you take quiz and that your last quiz score will be the quiz and that your last quiz score will be the one counted as your grade.one counted as your grade.

• Each quiz is worth 20 points.Each quiz is worth 20 points.

CISS 300CISS 300 1414

Page 15: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Final Exam:Final Exam:

• The final exam will be matching, short-answer The final exam will be matching, short-answer and essay in format. You can use both your notes and essay in format. You can use both your notes and your book. You must submit the answers for and your book. You must submit the answers for the final at the college on Saturday, July 17, from the final at the college on Saturday, July 17, from 9:00 to 10:50 a.m. in the BS-153 classroom. 9:00 to 10:50 a.m. in the BS-153 classroom.

• You will have access to the final exam one week You will have access to the final exam one week before the due date. You only come to the before the due date. You only come to the college to submit your answers on paper. It is college to submit your answers on paper. It is necessary to show a picture ID for identity necessary to show a picture ID for identity verification.verification.

CISS 300CISS 300 1515

Page 16: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Due Dates:Due Dates:

• Unless noted, all assignments will be submitted in Unless noted, all assignments will be submitted in Desire 2 Learn (d2l) under the “dropbox” link. Desire 2 Learn (d2l) under the “dropbox” link. – If, for any reason, you cannot access d2l or are unable to If, for any reason, you cannot access d2l or are unable to

submit the assignment on time, please email it to me submit the assignment on time, please email it to me instead so that you are not penalized for being late.instead so that you are not penalized for being late.

• Quizzes and the discussions items cannot be Quizzes and the discussions items cannot be taken past their due dates.taken past their due dates.– If you miss a quiz and you want to make up points, you If you miss a quiz and you want to make up points, you

can take advantage of the extra credit assignments can take advantage of the extra credit assignments posted in d2l.posted in d2l.

– Everyone is welcome to work on the extra credit Everyone is welcome to work on the extra credit assignments. Typically, they are five to ten points each, assignments. Typically, they are five to ten points each, depending on the difficulty of the assignment.depending on the difficulty of the assignment.

CISS 300CISS 300 1616

Page 17: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Late Work:Late Work:

• Unless noted, all assignments are due on Unless noted, all assignments are due on Sunday by midnight each week.Sunday by midnight each week.– I have identified the due dates in the course I have identified the due dates in the course

schedule.schedule.– Late work will be accepted ONLY if you have Late work will be accepted ONLY if you have

contacted me prior to the due date either by contacted me prior to the due date either by email or voice mail.email or voice mail.

– In general, late work is due the next week, and In general, late work is due the next week, and no late assignments may be turned in after one no late assignments may be turned in after one week from the original due date, regardless of week from the original due date, regardless of the reason.the reason.

– For every day an assignment is late, you will For every day an assignment is late, you will lose 10% of its grade.lose 10% of its grade.

CISS 300CISS 300 1717

Page 18: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Plagiarism Policy/Cheating:Plagiarism Policy/Cheating:

Plagiarism:Plagiarism:• It is inappropriate, and a violation of academic policy, to copy It is inappropriate, and a violation of academic policy, to copy

information from any source (including, but not limited to, textbooks, information from any source (including, but not limited to, textbooks, magazine articles, newspaper articles and internet articles) without magazine articles, newspaper articles and internet articles) without giving proper credit to the author by using standard quotation giving proper credit to the author by using standard quotation procedures such as in-line quotes, footnotes, endnotes, etc. Quotes procedures such as in-line quotes, footnotes, endnotes, etc. Quotes may not exceed 25% of the assignment's total length. You will may not exceed 25% of the assignment's total length. You will receive no credit (0 points) for any assignment that copies any receive no credit (0 points) for any assignment that copies any material from any other source without giving proper credit to the material from any other source without giving proper credit to the author(s). Repeat offenders of this policy are subject to academic author(s). Repeat offenders of this policy are subject to academic discipline as outlined in the policies published by the college.discipline as outlined in the policies published by the college.

Cheating:Cheating:• Students who cheat will receive a failing grade for the course. (See Students who cheat will receive a failing grade for the course. (See

the Student Behavior and Academic Integrity page of the college the Student Behavior and Academic Integrity page of the college website website (http://www.crc.losrios.edu/College_Catalog/General_Information/Stud(http://www.crc.losrios.edu/College_Catalog/General_Information/Student_Behavior_and_Academic_Integrity.htm).ent_Behavior_and_Academic_Integrity.htm).

CISS 300CISS 300 1818

Page 19: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

CRC Honor Code:CRC Honor Code:

• Academic integrity requires honesty, fairness, Academic integrity requires honesty, fairness, respect and responsibility. (See the Cosumnes respect and responsibility. (See the Cosumnes River College Honor Code posted on the college River College Honor Code posted on the college website website (http://www.crc.losrios.edu/documents/academic_(http://www.crc.losrios.edu/documents/academic_integrity_committee/Cosumnes%20Riverintegrity_committee/Cosumnes%20River%20College%20Honor%20Code%20(display%20College%20Honor%20Code%20(display%20version).pdf.)%20version).pdf.)

CISS 300CISS 300 1919

Page 20: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Dropping:Dropping:

• Students are responsible for dropping the Students are responsible for dropping the course.course.

CISS 300CISS 300 2020

Page 21: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Email/Discussions Etiquette:Email/Discussions Etiquette:• Every student will be required to have an email Every student will be required to have an email

account. If you do not have an email account, the account. If you do not have an email account, the college provides free email accounts for all current college provides free email accounts for all current students. To activate your account, go to students. To activate your account, go to https://imail.losrios.edu/ and follow the directions and follow the directions provided.provided.

• I will not tolerate rude and demeaning comments or I will not tolerate rude and demeaning comments or emails to anyone in this class. Please keep your emails to anyone in this class. Please keep your comments and emails topic-related. If I determine that comments and emails topic-related. If I determine that a comment or email to anyone else in the class is rude a comment or email to anyone else in the class is rude or demeaning, I will warn you once. If your behavior or demeaning, I will warn you once. If your behavior continues to be unacceptable, I will refer you to the continues to be unacceptable, I will refer you to the administration of the college for disciplinary action.administration of the college for disciplinary action.

CISS 300CISS 300 2121

Page 22: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Online Course Online Course Responsibilities: Responsibilities: • This course requires significant self-motivation. You must This course requires significant self-motivation. You must

not get behind. Projects and weekly assignments can take not get behind. Projects and weekly assignments can take up to 3 hours to finish. Please don’t try to finish them in up to 3 hours to finish. Please don’t try to finish them in one day. Not all activities are created equal. Some may one day. Not all activities are created equal. Some may take a bit longer than others. take a bit longer than others.

• You would normally spend 3 hours per week in class for this You would normally spend 3 hours per week in class for this course: total of 18 hours. Allow yourself at least 6 hours course: total of 18 hours. Allow yourself at least 6 hours per week to complete the activities online, including the per week to complete the activities online, including the time spent writing for the class discussions postings. You time spent writing for the class discussions postings. You should plan additional time to read the textbook and study should plan additional time to read the textbook and study for the quizzes.for the quizzes.

• Some people believe the online format provides a much Some people believe the online format provides a much easier way to study this subject than an on-campus easier way to study this subject than an on-campus framework because they love to read and avoid the parking framework because they love to read and avoid the parking problems. Others feel very intimidated at first. Be patient problems. Others feel very intimidated at first. Be patient as you work your way through the activities. as you work your way through the activities.

CISS 300CISS 300 2222

Page 23: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Using Desire 2 Learn (d2l):Using Desire 2 Learn (d2l):• How to log in:How to log in:

– You will not be able to participate in the online You will not be able to participate in the online portion of your class using Los Rios Online until portion of your class using Los Rios Online until you have enrolled in your course through your you have enrolled in your course through your college's registration system. college's registration system.

– Students registered as of the first day of the term Students registered as of the first day of the term should already have Los Rios Online accounts and should already have Los Rios Online accounts and be linked to the classes in which they are enrolled.be linked to the classes in which they are enrolled.

• To log on to your d2l account, open your web To log on to your d2l account, open your web browser and go to the following URL: browser and go to the following URL: https://d2l.losrios.edu

• Your User Name is the letter “w” followed by your Your User Name is the letter “w” followed by your Student ID# (example: w0123456).Student ID# (example: w0123456).

• Your password is your e-Services password.Your password is your e-Services password.

CISS 300CISS 300 2323

Page 24: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Grading:Grading:

Point System:Point System:There are 470 total assigned points.There are 470 total assigned points.

Grade Ranges:Grade Ranges: A= 423-470, B=376-422, C=329-375, D=282-328,

F=0-281CISS 300CISS 300 2424

Course TopicPoints Total Approximate % the of

Grade

Orientation Quiz (1) 10 10 2

Discussions (6) 10 60 12

Quizzes (6) 20 120 25

Case Projects (6) 15 90 19

Hands-on Projects (6) 15 90 19

Final Exam (1) 100 100 21

Page 25: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Sample Schedule:Sample Schedule:

CISS 300CISS 300 2525

Week: Lesson:

Online Lecture

: Proposed Schedule:Assignment

Due:Due Date

(By Midnight):Week 1 One Ch 1 Orientation and Introductions Discussion #1 Sun., Jun. 13

View the Online Orientation Orientation QuizRead Ch 1: Introduction to SecurityDo one Hands-on Project, and one Case Project from Chapter 1 Quiz #1

Hands-on Project #1

Case Project #1

Week 2 Two Ch 2 Read Ch 2: Desktop Security Discussion #2 Sun., Jun. 20Do one Hands-on Project, and one Case Project from Chapter 2 Quiz #2

Hands-on Project #2

Case Project #2

Page 26: Introduction to Information Systems Security CISS 300 Orientation Summer 2010.

Conclusion:Conclusion:

• Log into d2l and take the Orientation Quiz. Log into d2l and take the Orientation Quiz. It is due on Sunday, June 13, 2010. It is due on Sunday, June 13, 2010.

• Go to the Orientation Discussion and Go to the Orientation Discussion and introduce yourself to the class.introduce yourself to the class.

• Registered students for the class have Registered students for the class have access to d2l and can log into the campus access to d2l and can log into the campus network.network.

• Email any questions you might have to Email any questions you might have to me.me.

CISS 300CISS 300 2626