College of Business and Information Technology Mission Statement: Using a model of theory and…
College of Business and Information Technology Mission Statement: Using a model of theory and practice, the College of Business and Information Technology prepares a diverse body of domestic and international students for successful careers in a variety of organizations through interdisciplinary educational programs that emphasize analytical, technological, ethical, team work, global management, and interpersonal skills essential in an interconnected world economy. Faculty engagement in scholarly activity and service to the University, the profession, and the community complements our primary commitment to teaching and service excellence. Course Title: INT 7263, Threats, Vulnerabilities, Security Controls, & Countermeasures – CRN 1512: 3 credit hours Term: 27 August – 14 December 2018. Final Exams are the week of 17 December 2018. Please refer to the Registrar’s Calendar for the last date to withdraw and other important registration related information. Required Text and/or Course Materials:
1. Green, S.S. (2014). Security Program and Policies: Principles and Practices, 2nd edition. Pearson. ISBN 978-0789751676 2. Shostack, A. (2014). Threat Modeling: Designing for Security, 1ST edition. Wiley ISBN 978-1118809990 Available for online purchase through the LTU Bookstore
Instructor:
Name: Anne Kohnke, Ph.D. Title: Associate Professor E-mail address: akohnke@ltu.edu (best way to reach me) Meetings: Google Meet or Skype Tele: 248.204.3085 Office Room #: M320 Office hours: Mon, 2pm-5pm; Tues, 2:30pm-5:30; and Wed, 3pm-5pm; (it is highly recommended to make an appointment to ensure I am available)
Prerequisite Coursework and/or Skills:
• Graduate level INT 5024 Minimum Grade of C- and Graduate level INT 6043 Minimum Grade of C- or • Graduate level MIS 5023 Minimum Grade of C- and Graduate level MIS 6013 Minimum Grade of C-
Additional Materials:
• Windows Laptop/PC • Lynda.com, http://www.ltu.edu/ehelp/lynda.asp
Catalog Course Description: This course will introduce students to the principles of cybersecurity threats and vulnerabilities of an organization’s mission critical information assets in order to develop and implement effective security controls and countermeasures. Before an attack even occurs, organizations must strategically assess its cybersecurity risks, the likelihood and consequences of an attack, develop and prepare incident response teams and policies, develop and implement security controls and countermeasures, ensure compliance to all financial and governmental regulations, and be skilled in using the security testing tools and techniques. Students will be introduced to the methods, policies, frameworks, and security tools used to detect, respond, evaluate, and resolve computer security incidents. Course Outcomes: The course learning outcomes are aligned with the weekly course teaching and learning goals and assignments. The outcomes will be evaluated through assignments, assessments, and other methods throughout the course.
https://www.ltu.edu/registrars_office/academic-calendar-final-exam.asp
http://lawrence-tech.bncollege.com/webapp/wcs/stores/servlet/BNCBHomePage?storeId=30552&catalogId=10001&langId=-1
mailto:akohnke@ltu.edu
LTU Online INT 7263, Threats, Vulnerabilities, Security Controls, and Countermeasures
(Online) CRN 1512 Fall 2018
Page 2
The primary goal of this course is to provide an overview of cybersecurity threats and threat modeling, vulnerabilities, risk management, IT governance, security controls, and countermeasures. On completion of this course, you will be able to:
1. Understand IT Governance and the criticality of developing and implementing a comprehensive information security plan
2. Understand and create information security policies, policy elements and style, and successful policy characteristics
3. Understand risk management, identify mission critical information assets and understand how to classify data for risk assessment
4. Analyze and evaluate information security risk management frameworks, security control frameworks, libraries, and countermeasures
5. Design and develop management, technical, and operational security control policies and countermeasures for small to large complex corporate organizations.
6. Identify and understand threats and vulnerabilities to the information assets and learn the security tools to protect those assets
7. Understand and develop a comprehensive threat model 8. Understand and apply the elements of STRIDE 9. Evaluate attack trees and libraries and develop an attack tree 10. Understand how to process and manage threats and the defensive tactics and technologies used 11. Understand how to validate that threats are addressed 12. Understand discuss open source and commercial tools used in threat modeling 13. Understand and discuss security requirements 14. Examine web, cloud, and account threats 15. Examine human factors (insider threats)
Course Schedule: This fully online course begins with an online course orientation to familiarize you with the online learning environment and to establish contact with your instructor. Please complete the “Getting Started” Orientation by the first Monday of class. Each week starts on a Monday and ends on a Sunday.
Dates Modules Outcomes Topics / Readings Assignments Due Prior to August 27 Week of 8/27 – 9/2 No Classes 9/3- Labor Day Holiday
Module 0 Module 1 (Note: more than one module may be combined due to holidays and topics)
1 Welcome from the Instructor- Overview of the syllabus Chapter 1, Understanding Policy Chapter 2, Policy Elements and Style
Assignment #1-(Individual) Introductions posted in Discussion Forum
Week of 3-9 Sept
Module 2 & 3
1-5
Chapter 3 Part 1 & 2, Information Security Frameworks Chapter 4, Governance and Risk Management, Information Security Controls (Technical, Operational, Management Controls)
Assignment #2- Cybersecurity Policy Case Due by end of Module 3 Week of
10-16 Sept
LTU Online INT 7263, Threats, Vulnerabilities, Security Controls, and Countermeasures
(Online) CRN 1512 Fall 2018
Page 3
Dates Modules Outcomes Topics / Readings Assignments Due Week of 17-23 Sept
Module 4 1-5 Chapter 5, Asset Management Information / Data Classification
Discussion Forum
Week of 24-30 Sept
Module 5 6-7 Chapter 1, Threat Modeling Chapter 2, Strategies for Threat Modeling
Assignment #3-Risk Assessment Case Due by end of Module 5
Week of 1-7 Oct
Modules 6 & 7
6-8 Chapter 3, STRIDE-Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege
Assignment #4 – Threat Modeling Project Part 1 Due by end of Module 7
Week of 8-14 Oct
Week of 15-21 Oct
Module 8 1-8
Midterm Exam
Week of 22-28 Oct
Module 9 & 10
6-9
Chapter 4, Attack Trees Chapter 5, Attack Libraries ADTool Attack Tree Software Installation
Assignment #5 – Threat Modeling Project Part 2 Due by end of Module 10
Week of 29 Oct-4 Nov
Week of 5-11 Nov
Modules 11 6, 10 Chapter 7, Processing and Managing Threats Chapter 8 Defensive Tactics and Technologies
Discussion Forum
Week of 12-18 Nov
Module 12 11
Chapter 9, Trade-offs When Addressing Threats Chapter 10, Validating That Threats are Addressed
Assignment #6 – Threat Modeling Project Part 3 Due by end of Module 12
Week of 19-25 Nov No Classes 11/22-23 Thanksgiving Holiday
Modules 13 12, 13
Chapter 11, Threat Modeling Tools Chapter 12, Security Requirements
Discussion Forum
Week of 26 Nov-2 Dec
Modules 14 & 15
14
Chapter 13, Web and Cloud Threats Chapter 14, Accounts and Identity
Assignment #7 – Threat Modeling Project Part 4 Due by end of Module 15
Week of 3-9 Dec
LTU Online INT 7263, Threats, Vulnerabilities, Security Controls, and Countermeasures
(Online) CRN 1512 Fall 2018
Page 4
Dates Modules Outcomes Topics / Readings Assignments Due Week of 10-16 Dec
Module 16 15
Chapter 15, Human Factors and Usability
Assignment #8 – Threat Modeling Project Part 5 Due by end of Module 16
Week of 17 Dec
Finals Week 1-15 Final Exam
Student Assessment: The course has a total of 8 individual assignments, 4 discussion forums, and 2 exams totaling 440 points. Letter grades are awarded based on the total number of points achieved. All assignments must be submitted on schedule via Canvas. If you need to submit an assignment via email, contact the instructor in advance. Please refer to course policies for late work submissions. Assignments/Points:
Assignment Points Outcomes Assignments 1-8 (20 points each) 160 1-15 Midterm Exam 100 1-8 Online Participation 80 1-15 Final Exam 100 1-15 Total: 440
Grading Scale:
Grading Scale % Grade for Undergraduate Courses
Grade for Graduate Courses
95 and above A A 90 – under 95 A- A- 87 – under 90 B+ B+ 83 – under 87 B B 80 – under 83 B- B- 77 – under 80 C+ C+ 73 – under 77 C C 70 – under 73 C- C- 67 – under 70 D+ F 63 – under 67 D F 60 – under 63 D- F
Under 63 F F
Note: Grades lower than a “B” fall below the LTU graduate standard.
Assignments:
LTU Online INT 7263, Threats, Vulnerabilities, Security Controls, and Countermeasures
(Online) CRN 1512 Fall 2018
Page 5
Assignments and evaluation criteria will be provided in separate documents posted on Bb. Please review these requirements carefully. Assignments
• There will be a total of 8 Assignments and 4 discussion forums. An assignment is used to ensure that each student knows how to apply the knowledge (theory) learned in the modules to exercise (practice) the variety of topics covered. Each assignment will have a separate handout that will include instructions and due dates. Please use the naming convention for every Assignment electronic file: INT7263_Fall2018_Assignment#X_Your Name.
Exams • There will be a midterm and a final exam. The final exam will not be comprehensive of all material
covered during the term.
Course Policies: Communication:
• You are expected to participate regularly in the course. Take time to familiarize yourself with the organization of the Canvas site. Check the site frequently for new posts and/or announcements.
• All communication from LTU to students, faculty, and staff will be sent to Lawrence Tech email addresses and will not be sent to addresses in any other domain. Your LTU email is easily accessed from the www.my.ltu.edu website.
Attendance and Interaction: • It is essential that all students actively contribute to the course objectives through their experiences and
working knowledge. Participation may include actively participating in Canvas discussion forums, responding to questions posted by the instructor, and interacting positively with other students through various instructional methods and tools.
• Students who miss class cannot earn participation points—there is no extra credit. • If you miss two class sessions in a row, it is my responsibility to report your absence to the Registrar. • If you have any questions regarding your performance in the class or on graded assignments/class
materials, please contact me and I will be happy to meet with you on Google Hangouts or on Skype. • This online course will require your time and attention. A three-credit course generally requires at least
nine hours per week of time commitment. You are encouraged to create a schedule to manage your time and meet course requirements.
Assignments: • All assignments must be completed individually, except where explicitly specified as a team activity. In
completing the assignments, instructors expect that students will attempt to solve assigned problems by themselves or, if permitted by the instructor, by a group of students. Normally, instructors allow for general discussion between students about how to solve a problem. In no case, however, is it acceptable for one student to copy a solution from a peer. Copying or submitting very similar work to another student’s work will result in a zero for both students and an Honour Code Violation Form will be submitted to the Dean of Students.
Late Work: • Readings, discussion forum participation, and assignments must be completed according to the class
schedule. Late work will be reduced in value 5 points per day. After 3 days, the assignment will not be accepted.
Technology Tools:
• This course uses the Canvas Learning Environment www.my.ltu.edu and uses the following technology tools: embedded audio/video lectures, hyperlinks, discussion forums, Google Hangouts, etc. It is the student’s responsibility to have access to these tools and to be able to use them successfully.
http://ltu.edu/
http://my.ltu.edu/
http://www.my.ltu.edu/
LTU Online INT 7263, Threats, Vulnerabilities, Security Controls, and Countermeasures
(Online) CRN 1512 Fall 2018
Page 6
• Technical Support for using Canvas is provided by the Helpdesk at www.ltu.edu/ehelp, or 248.204.2330, or helpdesk@ltu.edu.
Sanctions: • Academic dishonesty includes plagiarism, cheating, forgery, or other acts that deceive or defraud in
regard to a student’s own academic work or that of others. The Dean of the College responsible for the courses in which they occur reviews questions of academic dishonesty. The usual penalty for academic dishonesty is failure in the course on the first offense, and expulsion from the University on the second offense. For more information visit Academic Honor Code at http://www.ltu.edu/currentstudents/honor_code.asp
University Policies, Services, and Information: The following LTU policies, services, and information may be found at LTU Online “Getting Started” Orientation:
• Help with Canvas and taking an online course, Netiquette, and technology accessibility statements • Minimum technical requirements and instructions for use, technical skills and special technology tools • University policies, including the Student Code of Conduct and Academic Honor Code • Student Academic Services, including the Library and the Academic Achievement Center • Student Support Services, including Disability Services, Advising, and all other university student services
Expectations of Instructor: I plan to offer you a valuable learning experience and expect us to work together to achieve this goal. It is important for you as students to know what to expect from me as your instructor:
• I will be available to you via e-mail and phone, and will promptly reply to your messages within 48-72 hours, not including the weekends.
• I will be available to you for appointments as requested. • I will maintain the Canvas web site with current materials, and will resolve any content-related problems
promptly as they are reported to me. • I will send out a weekly announcement as a guide to the upcoming work. • I will return all assignments to you promptly within two weeks, and will include individualized comments
and suggestions with each assignment. • I will hold our personal written or verbal communications in confidence. I will not post any of your
assignments for viewing by the class without requesting your approval in advance. • I will treat all members of the class fairly and will do my best to accommodate individual learning styles
and special needs. • If any of these points need clarification, or should special circumstances arise that require my assistance,
please contact me so that we may discuss and resolve the matter. • At midterm and at the end of the course, you will be invited to participate in a University evaluation of this
course. Your feedback is important to the University, to LTU Online, and to me as an instructor, and I strongly encourage your participation in the evaluation process.
http://www.ltu.edu/ehelp
mailto:helpdesk@ltu.edu
http://www.ltu.edu/ehelp/gettingstarted.asp
LTU Online INT 7263, Threats, Vulnerabilities, Security Controls, and Countermeasures
(Online) CRN 1512 Fall 2018
Page 7
Traits and Rubric to Assess Student’s Capabilities Related to Critical Thinking
Objective Trait Deficient (1–2) Competent (3–4) Exemplary (5–6) Score
Graduates can identify main problem and key assumptions
Identification of the main problem in a business situation
Student fails to identify the main problem in a business situation
Student substantially identifies the main problem in a business situation
Student comprehensively and precisely identifies the main problem in a business situation
Identification of the key assumptions surrounding a business situation
Student fails to identify the key assumptions surrounding a business situation
Student substantially identifies the key assumptions surrounding a business situation
Student identifies all the key assumptions surrounding a business situation
Graduates can evaluate the relevance of data
Evaluation of the relevance of the data
Student uses irrelevant data or ignores relevant data
Student correctly evaluates the relevance of the data
Student identifies logical data and ascertains source of irrelevant data
Evaluation of the validity of the data
Student fails to identify invalid data
Student correctly evaluates the validity of the data
Student separates valid data and ascertains source of invalid data
Graduates can present feasible solution
Ability to solve problems Student is unable to solve problems
Student solves problems in satisfactory manner
Student solves problems and provides insightful solutions
Ability to arrive at valid, supported conclusions
Student provides conclusions that are unsupported by the data
Student’s conclusions are supported by the data
Student’s solutions are supported by the data and demonstrate a deep understanding of the issues involved
Understanding of the implications of the conclusions
Student ignores implications of conclusions or generalizes beyond the scope of relevance
Student demonstrates an understanding of the immediate effects of the conclusions drawn
Student correctly generalizes conclusions to related areas affected by the issues
LTU Online INT 7263, Threats, Vulnerabilities, Security Controls, and Countermeasures
(Online) CRN 1512 Fall 2018
Page 8
Traits and Rubric to Assess Student’s Oral Presentation Skills, Master’s Programs
Objective Trait Deficient (1–2) Competent (3–4) Exemplary (5–6) Score
Graduate demonstrate mastery of communication technology.
Use of media Lack of/or misuse of media detracts from the presentation objective
Use of media supports and contributes to the presentation objective
Use of media supports, clarifies and reinforces the presentation objective
Quality of slides Misuse (not enough or too much) of colors, animations, and fonts detracts from the presentation objective
Use of media supports, clarifies, and reinforces the presentation objective
Use of colors, animations, fonts supports, clarifies, and reinforces the presentation objective
Graduate can develop and deliver a compelling oral presentation grounded in relevant information and facts.
Opening statement
Missing opening statement or statement does not introduce topic
Clear opening statement introduces topic
Clear opening statement introduces topic, captures audience attention, and sets tone for presentation
Organization Presentation is disorganized and/or not well sequenced
Presentation is organized and well sequenced with transitions. It previews and covers main points
Presentation is organized and well sequenced with smooth transitions. It previews, covers, and develops main points
Content Content is irrelevant or incorrect with no supporting evidence
Content is relevant and correct with supporting evidence
Content is relevant and correct with supporting evidence, and incorporates innovative insights
Conclusion Conclusion missing or content does not support the conclusion
Conclusion is supported by content and contains a review of key points
Conclusion is supported by content, contains a review of key points, and stimulates further inquiry with closing thought
Timing Presentation is too short resulting in insufficient coverage of material or is too long
Utilizes allotted time to provide sufficient coverage of material
Utilizes allotted time to provide sufficient coverage of material in a well-paced manner
Graduate can deliver a compelling oral presentation with clarity and appropriate poise.
Clarity of speech Inaudible or confusing, with a lack of fluency, and predominant use of sloppy speech patterns
Sufficient volume, understandable, avoids sloppy speech patterns
Modulates volume to hold audience attention. Is clear, articulate, and fluent
Engages audience Avoids eye contact, reads from slides or notes, or speaks in a monotone
Establishes eye contact Establishes eye contact and engages audience
Appearance Sloppy, inappropriate, or distracting appearance
Clean and well-groomed appearance, business casual attire
Professional attire

