SENECA COLLEGE Business Intelligence Research Analyst Program | ||||||||||||||||||
B.I.T.
801 RISK AND THREAT ASSESSMENT
This course examines risk and threat assessment from human, technological and environmental circumstances. Procedures, policies & techniques and countermeasures to assess risks levels and quantify threats. Focus on the ability of an organization to maintain business intelligence in the face of the growing intensity of global challenges. Topics include hacking, penetration testing, intrusion investigation, countermeasures, biometrics, cryptography, identity theft, DNS attacks, scams and viruses & firewalls. This subject is focused on a non-technical security perspective but some technical explanations will be available for enrichment.
|
||||||||||||||||||
As Taught by Prof. Tim Richardson School of Marketing and e-Business, Faculty of Business |
Section 1 | Section 3 | Section 4 | Section 5 | Section 6 |
o
Risk
o Threat o Vulnerability Fundamentals (Jan 08) Schneier
Chpt 3
|
Greene
Chpt 4
Schneier Chpt 20(Feb 5) (handed out Jan 31) Security Policies and Countermeasures oHoney Pots oPatches oBiometrics ------------------------------------------- Whitman Chpt 5 (Feb 12) Assessing & Controlling Risk ------------------------------------------- Whitman Chpt 6 (Feb 19) Mission, Vision Strategic Planning G.O.P.S.T. ---------------------------------------------------- Whitman Chpt 7 (Feb 19) Greene Chpt 11(Feb 21) Contingency Planning o Incident Response Planning o Disasater Recovery Planning o Business Continuity Planning ---------------------------------------------------- Greenstein Chpt 8(Feb 19) (handed out Jan 31) Risk Management - Penetration Testing - (Tiger Teams) Threat Modeling & Risk Assessment Risk Assessment Checklist.doc exercise (to discuss Feb 19) TEXAS www.stac.state.tx.us/ IRAPC/practices/(noted Jan 15) CALIFORNIA (to
discuss Feb 19)
|
Access Control
Greene Chpt 9 Security Processes o compartmentalize o secure weak link o use choke points o defense in depth o enlist users o detect attacks Intrusion Investigation -------------------------------------------- Greenstein Chpt 10 Schneier Chpt 6 Cryptography (Mar 18) and Encryption and Authentification ------------------------------------------- Cryptography Video (Mar 18) ------------------------------------------- Identification and Authentification o Confidentiality o Integrity o Authentification o Non-repudiation Greene Chpt 3 C.I.A. p. 66-71 Whitman Chpt 1 C.I.A. p. 10-13 ------------------------------------------- Greene Chpt 13 Access Controls o ICT devices o PC workstations o Access authentification Key Management
email security . PGP . PEM |
Greenstein
Chpt 11
Whitman Chpt 8 p. 276-284 Firewall Unit o Components o Functionality o Securing the Firewall -policy -administration o Firewall Limitations ----------------------------------- Internal Risks and Threats (Mar 25) ----------------------------------- Third-Party Risks & Threats (Mar 25) Outsourcing(Mar 25) ----------------------------------- Greenstein Chpt 12 E-payment systems ------------------------------------------ - Criminal Attacks - Privacy
Violations
- Publicity
Attacks
|
This
section is additional supplementary
material Industry Associations o RSA Security o SANS Institute Gov't response to intrusion and threats National Government Involvement
in internet crime and e-business security
Professional
|
Jan
8
Jan 15 Jan 15Mini-Assignment # 1 due Jan 22 Jan 29Mini-Assignment # 2 due Jan 29 - bad weather |
Feb
5
Feb 12 Feb 19 break week Feb 25 - 29th |
Mar
4
Mar 11 Mini-Assignment # 3 due Mar 18M |
Mar
25
Apr 01 Apr 01 Mini-Assignment # 5 due Apr 08A |
. |
handed out copies of Chpt 4 for discussion |
discussed Chpt 4 in class, in detail |
handed out copies of Chpt 5 for discussion Jan 22 |
will discuss
Chpt 7
copy will be given out in advance (left them w Jim Davidson to give to you) |
Mini-Assignment
# 2 - in your own words
A
- Find a real-life example of a company that encountered a risk situation,
describe what the threat was, and discuss, if you can tell, whatthe vulnerability
might have been to the threat being realized
B -
write this out on a page and bring to class Jan 29th
-
it is expected that you will be very energetic in your pursuit of a good
example and will take more than one or two sentances to describe this
discussed in
length Chpt 19 and 20
- including oHoney Pots oPatches oBiometrics |
discussed Chpt 5 in class |
CALIFORNIA www.oispp.ca.gov/government/risk/toolkit.asp
discussed Chpt
6 (one page re: GOPST) in class
handed out Chpt 7 for next class March 4th |
G.O.P.S.T.,
re-do in your groups, hand in March 4th 11th
took up the GOPST assignment
and discussed the terms
discussed Chpt 7 in class |
handed out the
beginning of Chpt 8 for discussion Mar 11
- (that deals with SOPs) handed out copies of Chpt 9 for discussion Mar 11 |
make a summary of Chpt 8 / Chpt 9 for discussion Mar 18 |
handed out copies of pages in Chpt 8 re: firewalls for discussion next class |
Mini-Assignment
# 5
for March 27th, hand in
April 1st
- research and discuss a
Canadian example (not on the BIT 801 website) of an Outsourcing Risk or
Third Party Risk
Discuss:
Katie will cover Contingency
Planning
George - Cryptography etc.
Catherine - outsourcing
Urvi - privacy violations
Dave - ???
You will be expected to make
a 10 minute presentation on the topic expanding on what already exists
on the site, as well as adding in any updates or additional information
as you see fit
The presentation will be
digitally recorded and it it "good", it may be added to the site as a "student
contribution"
- you are expected to come
on time at 8:00 and contribute meaningfully to each other's presentations
by paying attention and asking good questions
|
CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE |
. | |
MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I | |
. |