Homeworks
· HW 2: Added onMarch 7 (Survey analysispaper on Risk management)
· Youare expected to extensively search IEEE, ACM, Springer, Elsevier, NISTpublications and white papers and reports from industry
· Due:April 5, 2014
· HW 1: Added onJan 20 (Analysis of Pitt’s Policy; Review of 2 papers)
Reading materials for HW 1
· Paper 1: Information Security management: A humanchallenge?
· Paper 2: An integrated system theory of informationsecurity management
SampleTemplate, Samplereview
Lab Assignments
· Lab 3 (Hands-on 5): NetworkForensics (Due on April 12)
· Lab Assistant: Sean Hutchinson
· Lab 2 (Hands-on 3 and 4): Malware Analysis & Network SecurityAssessment (Two parts focused on EIGER virus)
· Lab Assistants: SheldonSensenig & Joel Land
· Note: ExtraLab during CSSD Visit (Hands-on 2): CSSD Computer Forensics exercise(Courtesy of John Franolich, GCFA)
· Host andNetwork Forensics – focused on Zeus malware
Learning goals
- Host and memory forensics
- Network forensics
- Malware analysis
· Use ofCrypto and tools include: ghex, gedit,Wireshark, Python
· Lab 1 (Hands-on 1): HostForensics + Supplement
· Lab Assistant: Sean Hutchinson
-
Paper Presentation/Reviews (TBA)