ist-456 fall 2011 security management

26
IST-456 Fall 2011 Security Management http://xkcd.com/ 538/

Upload: martina-jenkins

Post on 13-Dec-2015

217 views

Category:

Documents


3 download

TRANSCRIPT

IST-456 Fall 2011

Security Management

http://xkcd.com/538/

Objectives

• understand issues, techniques and technologies for security management

• discuss system vulnerabilities and mitigation strategies

• understand role of security inspections, certification and accreditation

• Understand interactions between systems design, systems management, social factors and socio-political environment as pertains to security management

• Basic understanding of emerging ISO/IEC 27000 (ISMS) standards

http://www.freefoto.com/preview/04-07-9/CCTV-Security-Camera

Your InstructorDr Gerry Santoro

• Founding Assoc. Prof. of IST• 25+ years IT, network and security experience

• 301-J IST Building

• (814) 571-8306 (SMS is OK)

About your instructor• Research Interests:

– Cyber-crime, security management, cyber-warfare

– Computer-Mediated Communications– Popular Culture and Technology

4

About your instructor

• Married (Suzi)• 4 kids (Gerald, Travis, Brandi, Kelsey)• Hobbies: Motorcycles, Guitar,

Astronomy, Aikido (2’nd Dan)• Advisor to: SRA Club, IST Interest

House, Penn State Aikido Club

5

Teaching/Learning Assistants

TA:

• Adan Ortiz-Cordova

LA:

• Timothy Sangjun Woo

http://www.freefoto.com/preview/22-32-5/RAF-Falcons-Parachute-Display-Team

Syllabus

• Located on Angel• read it carefully!• make note of due dates!

• contains • list of sessions• list of readings• quiz dates • due dates

http://www.openclipart.org/detail/89995/stack-of-books-01-by-anonymous

Readings• Michael E. Whitman and Herbert. Mattord, “Management of Information Security” Third Edition ISBN-13: 978-1-4354-8884-7• Other required readings will be assigned• Optional readings will also be provided

http://www.openclipart.org/detail/89995/stack-of-books-01-by-anonymous

Topics

• Introduction to Management of Information Security• Planning for Security• Planning for Contingencies• Information Security Policy• Developing the Security Program• Security Management Models• Security Management Practices

Topics (cont.)

• Risk Management• Vulnerabilities and Threats• Protection Mechanisms• Personnel and Security• Law and Ethics

Content of the topics• There will also be other (online) required

readings and occasional news items– These will be listed in the Syllabus and on Angel

• Class meetings will include a weekly summary of current security and security management news and issues– It is important that the information security

manager be aware of recent developments, attacks, vulnerabilities, etc.

• I will post important Web links at www.delicious/gmsantoro/456-fall-tags– News articles, journals, documents, resources,

etc.

11

Emphasis

Emphasis of IST-456 is on MANAGEMENT of security

• Methods, techniques, standards, approaches, best practices etc.• Goal is to control risk • Perhaps largest IT-related challenge for 21’st Century• Job outlook is very positive• Most problems with security come down to how it is managed

This is as much an art as it is a science!

Course Policies• During lectures you are not allowed to use classroom computers, cell phones, iPods, iPads or other technology

If you need these due to a documented learning disability please see meTime will be given during class for team and individual use of these technologies

• Late assignments/labs will receive a 20% penalty unless prior approval is given

Course Policies• If you have a disability and require special assistance please see me

I will only require documentation in case of need for use of assistive technology

• Course-related communication must use Angel

However you are free to call me or SMS me in the case of an emergency or simple questionYou are also welcome to stop by my office during office during office hours or any other time I am thereI promise to read Angel daily and respond within 1 business day if not sooner

Integrity• You are required to abide by the Penn State Policy on Academic Integrity

As posted in the syllabus

• You are required to abide by the Penn State policy on non-discrimination and respect

Please respect each other – everyone has something to contribute although skill levels may vary

Attendance• Attendance is required and is factored into your final grade.

Attendance policy:

Planned absence – notify ‘all course faculty’ using Angel before the absence

Unplanned absence – notify ‘all course faculty’ using Angel as soon as technically possible!

If you follow the attendance policy you will be excused and allowed to make up missed work

http://xkcd.com/140/

Other Nuggets

• Class meeting slides will be available on Angel

Extra credit will be provided, although the nature and amount of that credit will not be determined until sometime during the semester

Deliverables

• Quizzes (individual) (35%) 350 points• Mini-Problems and Exercises (team) (45%) 450 points• Security News Presentation (Team) (10%) 100 points•Self and Team Evaluation and Participation (10%) 100 points

Total (100%) 1000 points

Quizzes (35%)• There will be 8 quizzes this semester

The lowest quiz score will be dropped for each student

• Quizzes will be administered in classQuiz dates are listed in the syllabus

• Quizzes will cover required readings, material covered in class, and labs

• The format will be multiple-choice, true-false, and short answer• Your goal is to select or provide the BEST answer based on course material! Beware of semantics!• Each quiz will include one free question

http://www.openclipart.org/detail/137011/simple-question-sign-by-boobaloo

Mini Problems and Exercises (45%)

• Three team projects 15% each)• You will be provided with some initial resource or information

• article, Web site, situation problem, video, etc.

• Team will produce report essay (with references) providing analysis and answering questions

http://www.openclipart.org/detail/85003/computer-rage-by-eady

Security News Presentation (10%)• Team project

• Research an incident, methodology, approach, technology or other issue/technique in security news

• Develop outline and presentation materials for 5-8 minute presentation and present to class

• Be sure to relate it to Security Management and course contenthttp://www.openclipart.org/detail/131587/

newspaper-icon-by-jhnri4

Any questions on Syllabus?• Get familiar with ANGEL

• Use ANGEL to read/send emails via the Communicate Tab in ANGEL• Team space will be provided• Find where the components are located

• Read the syllabus and project descriptions

•You are responsible for knowing the information provided in the syllabus! (due dates, readings, etc.)•Look over the team problem descriptions

http://www.openclipart.org/detail/50287/%C3%89l%C3%A8ve-posant-une-question-/-student-asking-a-question-by-lmproulx

Tips for SuccessUse a personal calendar to plan

your semesterStay on top of the readingsAttend all classes – have short

meetings with your team after class time

Be sure to retrieve your graded quizzes and labs

Contact Dr. Santoro or one of the assistants if you have any questions of problems

http://www.flickr.com/photos/buschap/2224160715/sizes/m/in/photostream/

We want you to succeed!

Your success is our success!

Use the course as a launch pad for exploration

Be careful not to do anything that breaks the law or Penn State Policy!

http://www.publicdomainpictures.net/view-image.php?image=5520&picture=thumbs-up

Team cards • each student takes one index card

• on card put your name and Penn State access ID

• If you wish to be on a team with another student, hand in card WITH their card

• If there is a student that you do NOT wish to be on a team with – send me that info by 6 pm today on Angel email

• Teams will have 6-7 students• I will TRY to follow your wishes• Teams may adjust until end of drop/add

Questions?

End of class 1