Cyber Security: Emerging Threats and Countermeasures (AIT 701)

Dr. Massimiliano Albanese, Department of Applied Information Technology

Spring 2015. Mondays, 4:30 pm - 7:10 pm, Robinson Hall B205, Fairfax Campus

Office hours. By appointment

George Mason University

Catalog Description

The course covers security issues and current best practices in several applicative domains, ranging from the enterpjrise to the military. The course discusses emerging security threats and available countermeasures with respect to the most recent network and computing technologies, including wireless networks, computer-controlled physical systems, and social networks. The course concludes presenting current trends and open problems.

Course Goals

Upon successful completion of this course, students will:

Prerequisites

Registration in MS, Applied IT program or permission of Instructor.

Course Format

The course will employ lectures, in class-quizzes to assess progress, and a final exam. Students will be required to give a presentation at the end of the course.

Textbooks and Reading Materials

Required Textbook

CISSP:Certified Information Systems Security Professional Study Guide

CISSP: Certified Information Systems Security Professional Study Guide, 6th edition
James M. Stewart, Mike Chapple, and Darril Gibson
ISBN: 978-1-118-31417-3
Wiley, 2012

The required textbook is available electronically through the Safari Tech Books Online collection. You can access this book by following these steps:

Course Outline

Below is an outline of the 15 weekly class meetings.

  1. [01-26-2015] - Introduction to the course - Lecture 1: Accountability and access control (Chapter 1)
  2. [02-02-2015] - Lecture 2: Attacks and monitoring (Chapter 2)
  3. [02-09-2015] - Lecture 3: Review of networking concepts (Chapter 3) - Review session
  4. [02-16-2015] - In-class quiz n. 1 - Lecture 4: Communications security and countermeasures (Chapter 4)
  5. [02-23-2015] - Lecture 5: Security management (Chapter 5) & Policies and risk management (Chapter 6)
  6. [03-02-2015] - Lecture 6: Data and application security (Chapter 7) - Review session
  7. [03-16-2015] - In-class quiz n. 2 - Lecture 7: Malicious code and application attacks (Chapter 8)
  8. [03-23-2015] - Lecture 8: Cryptography and symmetric key algorithms (Chapter 9)
  9. [03-30-2015] - Lecture 9: PKI and cryptographic applications (Chapter 10) - Review session
  10. [04-06-2015] - In-class quiz n. 3 - Lecture 10: Principle of security models (Chapter 11) & Security Architecture Vulnerabilities, Threats, and Countermeasures (Chapter 12)
  11. [04-13-2015] - Lecture 11: Business continuity planning (Chapter 15) & Disaster recovery planning (Chapter 16)
  12. [04-20-2015] - Lecture 12: Legal and ethical issues (Chapters 17 & 18)
  13. [04-27-2015] - Lecture 13: Research Topics in Cyber Security - Review session
  14. [05-04-2015] - Student presentations
  15. [05-11-2015] - Final exam

Course Tools

The following tools will be used in this course.

Additional Resources & Information

Below is a list of additional and useful resources.

Students with a documented learning disability or other condition that may affect academic performance should: (1) make sure their documentation is on file with the Office of Disability Services to determine the accommodations they need; and (2) talk with the instructor to discuss their accommodation needs.

Grading Policy

Grading will be based on class participation, assignments, and exams. Points for course activities will accrue as follow:

Activity Points
Class participation¬†(≠ class attendance) 100
In-class quizzes (3 @ 70 points each) 210
Group Presentation 100
Final exam 150
Total 560

Final letter grades are assigned as follows. Breakpoints may be adjusted depending on overall class performance.

Point % range Letter grade
97% - 100% A+
93% - 96.9% A  
90% - 92.9% A- 
87% - 89.9% B+
83% - 86.9% B  
80% - 82.9% B- 
77% - 79.9% C+
73% - 76.9% C  
  0% - 72.9% F  

Extra Credits. Students who wish to recover credits lost in other course activities can volunteer to prepare and give short presentations (4-5 content slides, 8-10 minutes) on a topic of their choice. Each short presentation will earn up to 25 points, for a maximum of two presentations per student during the entire course. Students must notify the instructor in advance of their intention to give an extra credit presentation. Time and topic of the presentation must be approved by the instructor. Student giving an extra credit presentation must submit their slides to the instructor no later than 3pm on the day of the presentation. The last day to give an extra presentation is April 27, 2015. Students passing the CISSP exam will earn 25 bonus points. No other extra credit opportunities beyond those mentioned will be offered to students.

Attendance. Regular attendance is strongly recommended. Students will be held responsible for all material covered in class. Quizzes and exams are given on the dates specified on the course schedule. Absence from taking any quiz/exam will result in a score of zero, unless cleared in advance with the instructor and arranged for a makeup session. Excusable absences are normally related to unavoidable and documented emergency situations.

Final Grades. Final grades are non-negotiable, and cannot be disputed once posted. Any request to adjust grades after they have been posted will be denied unless there has been a factual error on the instructor's side.

Valid XHTML 1.0 Transitional Valid CSS!