- “Interesting Assignments” – What were some of the more interesting assignments to you?
- “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
- “Perspective” – How has this course changed your perspective?
- “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?
1
Chapter 1: Security Governance Through Principles and Policies
Petac Eugen, & Duma Petru?. (2018). Exploring the New Era of Cybersecurity Governance. Ovidius University Annals: Economic Sciences Series, 1, 358.
*Failing to Participate in Week 1 may result in being dropped from the course.
2
Chapter 2: Personnel Security and Risk Management Concepts
Fisk, G., Ardi, C., Pickett, N., Heidemann, J., Fisk, M., & Papadopoulos, C. (2015, May). Privacy principles for sharing cyber security data. In 2015 IEEE Security and Privacy Workshops (pp. 193-197). IEEE.
N. Kamenskih, M. A. Filippov and A. A. Yuzhakov, “The Development of Method for Evaluation of Information Security Threats in Critical Systems,” 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, 2020, 333-336.
3
Chapter 3: Business Continuity Planning
Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks. IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. 535–543. https://doi.org/10.1109/CCST.2003.1297616
4
Chapter 4: Laws, Regulations, & Compliance
Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089
RES
5
- Residency Project (Paper and Presentation)
- Practical Connection Activity – 500-word personal paper
Chapter 6: Cryptography and Symmetric Key Algorithms
Chapter 7: PKI & Cryptographic Applications
Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103
Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices.
6
Chapter 8: Principles of Security Models, Design, & Capabilities
Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. 10.1109/WCNCW.2018.8369033
Ruiz, N., Bargal, S.A., & Sclaroff, S. (2020). Disrupting DeepFakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.
7
Chapter 9: Security Vulnerabilities, Threats, & Countermeasures
NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122.
8
Chapter 5: Protecting Security of Assets
Chapter 10: Physical Security Requirements
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414
9
Chapter 11: Secure Network Architecture & Secure Network Components
Chapter 12: Secure Communications and Network Attacks
A. Satapathy and L. M. J. Livingston. (2016). “A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud,” in Indian Journal of Science and Technology, 9(6). DOI: 10.17485/ijst/2016/v9i6/81980
D. B. Rawat, 2019. “Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization,” in IEEE Communications Magazine, vol. 57, no. 10, 50-55
T. Surasak and S. C. -. Huang, “Enhancing VoIP Security and Efficiency using VPN,” 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184.
10
Chapter 13: Managing Identity & Authentication
Chapter 14: Controlling & Monitoring Access
J. Tioh, D. M. Mina and D. D. W. Jacobson, “Cyber Security Social Engineers An Extensible Teaching Tool for Social Engineering Education and Awareness,” 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5.
11
Chapter 15: Security Assessment and Testing
Goutam and V. Tiwari, “Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application,” 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.
G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, “Penetration Testing Framework for IoT,” 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482.
12
Chapter 16: Managing Security Operations
Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security, 17(6), 681–699. https://doi.org/10.1007/s10207-017-0382-0
13
Chapter 17: Preventing and Responding to Incidents
M. Ioannou, E. Stavrou and M. Bada, “Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication & coordination,” 2019 International Conference on Cyber Security & Protection of Digital Services (Cyber Security), 2019, 1-4.
M. Zeybek, E. N. Y?lmaz and ?. Alper Do?ru, “A Study on Security Awareness in Mobile Devices,” 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 2019, 1-6.
14
Chapter 18: Disaster Recovery Planning
J. Mendonça, W. Medeiros, E. Andrade, R. Maciel, P. Maciel and R. Lima, “Evaluating Database Replication Mechanisms for Disaster Recovery in Cloud Environments,” 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 2358-2363.
15
Chapter 19: Incidents and Ethics
16
Chapter 21: Malicious Code and Application Attacks


0 comments