Week Topic Assignments
1
Chapter 1: Security Governance Through Principles and Policies
Petac Eugen, & Duma Petruţ. (2018). Exploring the New Era of Cybersecurity Governance. Ovidius University Annals: Economic Sciences Series, 1, 358.
*Failing to Participate in Week 1 may result in being dropped from the course.
Welcome Discussion
Academic Honesty Pledge Signed *
*Must sign this pledge to continue with the course
Discussion 1 *
Due: 05/10/2021
2
Chapter 2: Personnel Security and Risk Management Concepts
Fisk, G., Ardi, C., Pickett, N., Heidemann, J., Fisk, M., & Papadopoulos, C. (2015, May). Privacy principles for sharing cyber security data. In 2015 IEEE Security and Privacy Workshops (pp. 193-197). IEEE.
N. Kamenskih, M. A. Filippov and A. A. Yuzhakov, "The Development of Method for Evaluation of Information Security Threats in Critical Systems," 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, 2020, 333-336.
Review APA
Review UC plagiarism policy
Review paraphrasing techniques
Due: 05/17/2021
3
Chapter 3: Business Continuity Planning
Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks. IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. 535–543. https://doi.org/10.1109/CCST.2003.1297616
Research Paper
Due: 05/24/2021
4
Chapter 4: Laws, Regulations, & Compliance
Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089
Discussion 2
Due: 05/31/2021
RES
5
Residency Project (Paper and Presentation) Practical Connection Activity – 500-word personal paper
Chapter 6: Cryptography and Symmetric Key Algorithms
Chapter 7: PKI & Cryptographic Applications
Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103
Residency
Due: 06/06/2021 - 2 PM EST
Discussion 3
Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices.
Due: 06/07/2021
6
Chapter 8: Principles of Security Models, Design, & Capabilities
Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. 10.1109/WCNCW.2018.8369033
Ruiz, N., Bargal, S.A., & Sclaroff, S. (2020). Disrupting DeepFakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.
Research Paper
Due: 06/14/2021
7
Chapter 9: Security Vulnerabilities, Threats, & Countermeasures
NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122.
Research Paper
Due: 06/21/2021
8
Chapter 5: Protecting Security of Assets
Chapter 10: Physical Security Requirements
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245- 1439.414
Discussion 4
Due: 06/28/2021
9
Chapter 11: Secure Network Architecture & Secure Network Components
Chapter 12: Secure Communications and Network Attacks
A. Satapathy and L. M. J. Livingston. (2016). "A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud," in Indian Journal of Science and Technology, 9(6). DOI: 10.17485/ijst/2016/v9i6/81980
D. B. Rawat, 2019. "Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization," in IEEE Communications Magazine, vol. 57, no. 10, 50-55
T. Surasak and S. C. -. Huang, "Enhancing VoIP Security and Efficiency using VPN," 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184.
Discussion 5
Due: 07/05/2021
10
Chapter 13: Managing Identity & Authentication
Chapter 14: Controlling & Monitoring Access
J. Tioh, D. M. Mina and D. D. W. Jacobson, "Cyber Security Social Engineers An Extensible Teaching Tool for Social Engineering Education and Awareness," 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5.
Research Paper
Due: 07/12/2021
11 Chapter 15: Security Assessment and Testing
Goutam and V. Tiwari, "Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application," 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.
G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, "Penetration Testing Framework for IoT," 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482.
Discussion 6
Due: 07/19/2021
12
Chapter 16: Managing Security Operations
Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security, 17(6), 681–699. https://doi.org/10.1007/s10207-017- 0382-0
Research Paper
Due: 07/26/2021
13
Chapter 17: Preventing and Responding to Incidents
M. Ioannou, E. Stavrou and M. Bada, "Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication & coordination," 2019 International Conference on Cyber Security & Protection of Digital Services (Cyber Security), 2019, 1-4.
M. Zeybek, E. N. Yılmaz and İ. Alper Doğru, "A Study on Security Awareness in Mobile Devices," 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 2019, 1-6.
Discussion 7
Due: 08/02/2021
14
Chapter 18: Disaster Recovery Planning
J. Mendonça, W. Medeiros, E. Andrade, R. Maciel, P. Maciel and R. Lima, "Evaluating Database Replication Mechanisms for Disaster Recovery in Cloud Environments," 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 2358-2363.
Final paper draft
Due: 08/09/2021
15
Chapter 19: Incidents and Ethics Final Portfolio Research Paper
Due: 08/16/2021
16
Chapter 21: Malicious Code and Application Attacks
Last day of class and last day to submit assignment 08/19/2021
Discussion 8: Reflective Activity
Due: 08/18/2021
Course Ends: 08/19/2021
Syllabus Disclaimer
This syllabus contains important information critical to your success in this course. It includes guidelines for this course and the instructor’s current expectations about content, schedule, and requirements necessary for each student to achieve the best educational results. While you must review and become familiar with the contents of this syllabus, the instructor reserves the right to make adjustments or change in the syllabus from time to time. Any changes to the syllabus will be discussed with the students.

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com