Lectures
This page contains tentativelecture plan and the lecture slides.
Week | Coverage | Slides | |
Week 1 (Jan 8) |
| Lecture 1 (PDF)
| |
Week 2 (Jan 15) | [Continue Lecture 1] Contingency Planning, Information Security Policy &Programs, (Chap 3-5 of Whitman book; notes in reading list section) Additional Reading: Contingency Planning Guide for Information Technology System (NIST 800-34) Generally Accepted Principles and Practices for Securing Information Technology Systems (NIST 800-14) (Covered till Slide 13 of Lecture 2) | Lecture 2 (PDF) | |
Week 3 (Jan 22) | Continue Lecture 2 Overview of Computer Forensics (Source: Guide to Integrating Forensic Techniques into Incident Response (NIST SP800-86) | Lecture 3 (PDF) | |
Week 4 (Jan 29) | Class will be held at Pitt’s CSSD Unit (Bellefield Hall) - Overview of CSSD’s InfoSec Infrastructure/Team/Program - Presentation and Discussion on Pitt’s InfoSec IRP/DRP (Sean Sweeney, Jay Graham, CSSD) - Demo and some hands-on on Computer Forensics at CSSD READ NIST DOCUMENTS LISTED ABOVE BEFORE THIS CLASS – Actively participating in the discussion about CSSD is expected | (CSSD Proprietary slides on Info Sec plan and a Computer forensics lab/case study) | |
Week 5 (Feb 5) | Risk Management (Chaps on Security Management of Whitman book; notes in reading list section) (NIST: Managing Information Security Risk: Organization, Mission, and Information System View (SP 800-39)) (Covered till Slide 13 of Lecture 4) | Lecture 4 (PDF) | |
Week 6 (Feb 12) | Cancelled | ||
Week 7 (Feb 19) | Management Models/Practices (source: Whitman book; ISO standards, NIST documents – identified in the lecture) (Covered till Slide 23 of Lecture 5) | Lecture 5 (PDF) | |
Week 8 (Feb 26) | Cloud Computing: Security and Privacy Issues (See Reading List) | Lecture 6 (PDF) | |
Week 9 (March 5) | Guest Lecture by Prof. Palanisamy on “Cloud Computing” | Guest Lecture (PDF) | |
Spring Break | |||
Week 10 (March 19) | (Finish Lecture 6) Managing of Software/Systems Development: Process Models/Methodologies (SEI/CERT and Misc) Supply Chain security Issues (NIST 800-61) Project discussion | Lecture 7 (PDF) | |
Week 11 (March 26) | Insider Threat (Guest: Nathalie Baracaldo) Security and Privacy issues in Social Networks (Guest Lecture: Lei Jin) | Insider Threats (PDF) Security/Privacy in SN (PDF) | |
Week 12 (April 2) | Visit to Pitt’s NoC Reading Assignments | | |
Week 13 (April 9) | Presentations | THEME: Security and Privacy in Healthcare 1. Securing the E-Health Cloud 2. Protecting Health Information on Mobile Devices 3. They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices 4. A Privacy Framework for Mobile Health and Home-Care Systems THEME: BigData + Policy 5. SAFE- Secure and Big Data-Adaptive Framework for Efficient Cross-Domain Communication 6. Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks | |
Week 14 (April 16) | Presentations | THEME: Critical Infrastructure Protection 1. Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs Presenter: Michael Marin 2. Cyber security risk assessment for SCADA and DCS networks 3. SCADA security in the light of Cyber-Warfare 4. A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS 5. Architecture-Driven Smart Grid Security Management 6. CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems 7. A Cloud-Based Consumer-Centric Architecture for Energy Data Analytics | |
Week 2 (April 23) | Project Due/Presentations/Demons | ||