Week Topic Assignments

1

Chapter 1: Security Governance Through Principles and Policies

Petac Eugen, & Duma Petruţ. (2018). Exploring the New Era of Cybersecurity Governance. Ovidius University Annals: Economic Sciences Series, 1, 358.

*Failing to Participate in Week 1 may result in being dropped from the course.

Welcome Discussion

Academic Honesty Pledge Signed *

*Must sign this pledge to continue with the course

Discussion 1 *

Due: 05/10/2021

2

Chapter 2: Personnel Security and Risk Management Concepts

Fisk, G., Ardi, C., Pickett, N., Heidemann, J., Fisk, M., & Papadopoulos, C. (2015, May). Privacy principles for sharing cyber security data. In 2015 IEEE Security and Privacy Workshops (pp. 193-197). IEEE.

N. Kamenskih, M. A. Filippov and A. A. Yuzhakov, "The Development of Method for Evaluation of Information Security Threats in Critical Systems," 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, 2020, 333-336.

Review APA

Review UC plagiarism policy

Review paraphrasing techniques

Due: 05/17/2021

3

Chapter 3: Business Continuity Planning

Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks. IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. 535–543. https://doi.org/10.1109/CCST.2003.1297616

Research Paper

Due: 05/24/2021

4

Chapter 4: Laws, Regulations, & Compliance

Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089

Discussion 2

Due: 05/31/2021

RES

   

Residency Project (Paper and Presentation) Practical Connection Activity – 500-word personal paper

Chapter 6: Cryptography and Symmetric Key Algorithms

Chapter 7: PKI & Cryptographic Applications

Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103

Residency

Due: 06/06/2021 - 2 PM EST

Discussion 3 

Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices. 

Due: 06/07/2021

6

Chapter 8: Principles of Security Models, Design, & Capabilities

Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. 10.1109/WCNCW.2018.8369033

Ruiz, N., Bargal, S.A., & Sclaroff, S. (2020). Disrupting DeepFakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.

Research Paper

Due: 06/14/2021

7

Chapter 9: Security Vulnerabilities, Threats, & Countermeasures

NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122.

Research Paper

Due: 06/21/2021

8

Chapter 5: Protecting Security of Assets

Chapter 10: Physical Security Requirements

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245- 1439.414

Discussion 4 

Due: 06/28/2021

9

Chapter 11: Secure Network Architecture & Secure Network Components

Chapter 12: Secure Communications and Network Attacks

A. Satapathy and L. M. J. Livingston. (2016). "A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud," in Indian Journal of Science and Technology, 9(6). DOI: 10.17485/ijst/2016/v9i6/81980

D. B. Rawat, 2019. "Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization," in IEEE Communications Magazine, vol. 57, no. 10, 50-55 

T. Surasak and S. C. -. Huang, "Enhancing VoIP Security and Efficiency using VPN," 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184.

Discussion 5 

Due: 07/05/2021

10

Chapter 13: Managing Identity & Authentication

Chapter 14: Controlling & Monitoring Access

J. Tioh, D. M. Mina and D. D. W. Jacobson, "Cyber Security Social Engineers An Extensible Teaching Tool for Social Engineering Education and Awareness," 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5.

Research Paper

Due: 07/12/2021

11 Chapter 15: Security Assessment and Testing

Goutam and V. Tiwari, "Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application," 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.

G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, "Penetration Testing Framework for IoT," 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482.

Discussion 6 

Due: 07/19/2021

12

Chapter 16: Managing Security Operations

Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security, 17(6), 681–699. https://doi.org/10.1007/s10207-017- 0382-0

Research Paper

Due: 07/26/2021

13

Chapter 17: Preventing and Responding to Incidents

M. Ioannou, E. Stavrou and M. Bada, "Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication & coordination," 2019 International Conference on Cyber Security & Protection of Digital Services (Cyber Security), 2019, 1-4.

M. Zeybek, E. N. Yılmaz and İ. Alper Doğru, "A Study on Security Awareness in Mobile Devices," 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 2019, 1-6.

Discussion 7 

Due: 08/02/2021

14

Chapter 18: Disaster Recovery Planning

J. Mendonça, W. Medeiros, E. Andrade, R. Maciel, P. Maciel and R. Lima, "Evaluating Database Replication Mechanisms for Disaster Recovery in Cloud Environments," 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 2358-2363.

Final paper draft

Due: 08/09/2021

15

Chapter 19: Incidents and Ethics Final Portfolio Research Paper

Due: 08/16/2021

16

Chapter 21: Malicious Code and Application Attacks

Last day of class and last day to submit assignment 08/19/2021

Discussion 8: Reflective Activity

Due: 08/18/2021

Course Ends: 08/19/2021

Syllabus Disclaimer

This syllabus contains important information critical to your success in this course. It includes guidelines for this course and the instructor’s current expectations about content, schedule, and requirements necessary for each student to achieve the best educational results. While you must review and become familiar with the contents of this syllabus, the instructor reserves the right to make adjustments or change in the syllabus from time to time. Any changes to the syllabus will be discussed with the students.

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com