290 likes | 387 Views
CSCE 727 Information Warfare. Instructor: Csilla Farkas Class time: M, W 2:50 – 4:05 pm Class Homepage: http://www.cse.sc.edu/~farkas/csce727-2014/csce727.htm Office Hours: M, W 2:00 – 2:30 pm and 4:15 – 5:15 pm or by appointment.
E N D
Instructor: Csilla Farkas • Class time: M, W 2:50 – 4:05 pm • Class Homepage: http://www.cse.sc.edu/~farkas/csce727-2014/csce727.htm • Office Hours: • M, W 2:00 – 2:30 pm and 4:15 – 5:15 pm or by appointment
Prerequisite(s) or corequisite(s): CSCE 522 or permission of instructor • Course objectives: Introduction to information warfare principles and technologies. • Defensive information warfare • Offensive information warfare
Basic Bibliography • Required: • D. Denning: Information Warfare and Security (Addison Wesley, 1998, ISBN: 0201433036) • Lecture handouts and references listed for each lecture • Recommended: • Cyber Warfare: Mapping the Cyber Underworld (O’Reilly Media,2nd edition, 2011, ISBN-10: 1449310044, ISBN-13: 978-1449310042)
Student Work • Research project: there will be one individual research project with a final submission of a research paper • Homework and class participation: there will be several homework assignments based on textbook material and reading assignments • Tests: there will be two in-class, open book tests
GRADING • Research project: 25% • Presentation of related work: 5%) • Homework assignments: 25% • Tests: 45% (midterm 20%, final 25%) • Final grades are calculated from a total score of 100: 90 < A 87 < B+ <= 90 80 < B <= 87 76 < C+ <= 80 65 < C <= 76 60 < D+ <= 65 50 < D <= 60
Tentative Schedule • Week 1-3: Fundamental IW concepts • Week 4-9: Offensive Activities • Week 10-13: Defensive Information Warfare • Week 14-15: Student Presentations
Student IntroductionYour NameMajorExposure to Information AssuranceWhat you expect to gain from this classArea of interest
IA Specialization • Undergraduate and Graduate level • Core Requirement (3 Hours) • CSCE 522: Information Security Principles (3 credits) – meets CNSS 4011 standard • Additional Requirements: • Elective IA course (3 credit) • 2nd elective course (3 credits) or 500-level or above CSCE course with IA project component
CNSS Certifications • National Training Standard for Information Systems Security Professionals, CNSSI No. 4011 • National Training Standard for System Administrators in Information Systems Security, CNSSI No. 4013 • National Training Standard for Information Systems Security Officers, CNSSI No. 4014
IA&S Courses • Offered since 2000 • 12 new courses • 4 undergraduate and graduate • 8 graduate students only • Approved by USC • Accredited by the Committee on National Security Systems (CNSS)
IA&S Certificate Programhttp://www.cse.sc.edu/isl/education/iaands (modifications are being proposed)
Graduation requirements 12 hours of graduate study with B average • 6 hours core courses • 6 hours of elective courses
Core Courses • CSCE 522 – Information Systems Security Principles • offered every Fall semester -- APOGEE • CSCE 715– Network Security • offered every Fall semester
Elective Courses • CSCE 517 – Computer Crime and Forensics • CSCE 557 – Introduction to Cryptography • CSCE 548 – Secure Software Construction • CSCE 716 – Design for Reliability • CSCE 717 – Comp. Systems Performance • CSCE 727 – Information Warfare • CSCE 813 – Internet Security • CSCE 814 – Distributed Systems Security • CSCE 824 – Secure Databases
Center for Information Assurance Engineering (CIAE) • http://www.cse.sc.edu/isl • Information about: • Research • Education • Publications • People • Useful links
Committee on National Security Systems (CNSS) • CNSS 4011: National Information Assurance Training Standard for Information Systems Security Professionals • CSCE 522 + 1 additional IA course + 1 course with IA project • CNSS 4013: National Information Assurance Training Standard for System Administrators • CNSS 4011 requirements + CSCE 727 • CNSS 4014: National Information Assurance Training Standard for Information Systems Security Officers • CNSS 4011 requirements + CSCE 727 + CSCE 715 20
Information Systems Security(Overview)http://www.cse.sc.edu/~farkas/csce522-2013/csce522.htm
Security Objectives • Confidentiality: prevent/detect/deter improper disclosure of information • Integrity: prevent/detect/deter improper modification of information • Availability: prevent/detect/deter improper denial of access to services • Authenticity: Verify claimed identity • Non-Repudiation: Cannot deny action
Achieving Security • Policy • What to protect? • Mechanism • How to protect? • Assurance • How good is the protection?
Security Tradeoffs Security Functionality COST Ease of Use
Information Security Planning • Organization Analysis • Risk management • Mitigation approaches and their costs • Security policy and procedures • Implementation and testing • Security training and awareness
Carry Out Fixes and Validate Identify Business and Technical Risks Define Risk Mitigation Strategy Synthesize and Rank Risks Measurement and Reporting Risk Management Framework (Business Context) Who Cares? Understand Business Context Strengthen system Why care? What should be done? How to mitigate risk? 26
The Art… Policies and procedures Privacy Best practices Ethics and Law National-level considerations International considerations Etc.