Top Banner
Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information Assurance School of Business & Management Norwich University [email protected]
25

1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

Mar 27, 2015

Download

Documents

Alyssa Dillon
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

1 Copyright © 2010 M. E. Kabay. All rights reserved.

Introduction

IS 340 – Information AssuranceLecture # 1

M. E. Kabay, PhD, CISSP-ISSMPAssoc Prof Information AssuranceSchool of Business & Management

Norwich University [email protected]

Page 2: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

2 Copyright © 2010 M. E. Kabay. All rights reserved.

TopicsGoalsClassesTextbookWeb SiteGradingTerm paperResearchCitationsPresentationExams

Online DiscussionsExtra WorkMoviesHonesty &

Attendance Introductions &

PhotosSQ3RReadings for next

classMovie This Friday

Page 3: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

3 Copyright © 2010 M. E. Kabay. All rights reserved.

Goals

Lay foundations for working effectively in information assurance (IA) in military, government, business & academia

Contribute to public discussion of laws governing behavior when using computers and networks

Stimulate interest in IALead to successful careersHelp protect friends and family against

computer crimeHave fun in class with challenging ideas &

discussions!

Page 4: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

4 Copyright © 2010 M. E. Kabay. All rights reserved.

Classes

Don't be late for classProf won't be lateProf won't make you late

Don't miss classAttendance taken at start of class>2 unexcused absences = OUT

Read before you arriveQuestions in classParticipation graded (10%)

Page 5: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

5 Copyright © 2010 M. E. Kabay. All rights reserved.

Textbook Bosworth, Kabay & Whyne (2009)

CSH5 – Computer Security Handbook, 5th ed.

Also useful to build up biceps & triceps

Can be helpful in propping doors open or to raise monitor to eye level

Eric Whyne Graduated from NU in 2004

Major in Computer ScienceMinors in Mathematics, IA,

EngineeringServed in Iraq as Captain in US Marine

CorpsCurrently working in high-tech

research

Page 6: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

6 Copyright © 2010 M. E. Kabay. All rights reserved.

Web Site

http://www.mekabay.com/courses/academic/norwich/is340

All information, documents about course

Lecture materials

Schedule in syllabus

Extra readings

Guidelines for papers

List of topics to be presented by students

Page 7: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

7 Copyright © 2010 M. E. Kabay. All rights reserved.

GradingTerm paper 35%Presentation 5%Quizzes 20%Mid-term exam 15% (in-class)Final exam 25% (exam period)Extras: added to final score

Essays (1 pt/500 words)Articles (extra)Presentations (1 pt/20 minutes in class)Online discussions

0.1 pt/good contribution (e.g., w/ reference)Max 10 pts increase to total score

Page 8: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

8 Copyright © 2010 M. E. Kabay. All rights reserved.

Term paper

Features3000-4000 words longAcademic standards for writing & sourcesSee Term-Paper Guidelines

Complete stages BEFORE deadlinesSep: Choose topicOct: OutlineNov: Drafts & discussions with prof.Dec: Final submission

Page 9: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

9 Copyright © 2010 M. E. Kabay. All rights reserved.

Research

Kreitzberg Library DatabasesWikipedia only as source for

primary referencesSearch-engine articles OK but secondary to

academic research articlesMay include hands-on projects using virtual

laboratory (see instructor for arrangements)Use CATA™ to organize information

Computer-Aided Thematic Analysis™http://www.mekabay.com/methodology/CATA.pdf http://www.mekabay.com/methodology/cata.pps

Page 10: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

10 Copyright © 2010 M. E. Kabay. All rights reserved.

Citations

MUST cite all information that is not your own creation

Use automatic (NOT MANUAL) footnotes (not endnotes)

Word 2007 has bibliography featuresWill generate Works Cited

list for youMLS, APA or CMS styles

acceptableBe consistent

Page 11: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

11 Copyright © 2010 M. E. Kabay. All rights reserved.

Presentation 20 minutes Max 15 slides unless you obtain special

permission by demonstrating talk to instructor

Dark letters on light background OR light letters on dark background

Purple letters on blood-red background will make instructor violently ill

Slides are point form, not full text Don’t read the text on the slides! Don’t look at the screen – use the laptop Tell us what you found most interesting Relax – everyone wants you to succeed

Page 12: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

12 Copyright © 2010 M. E. Kabay. All rights reserved.

Exams

No tricks: no attempt to fool youCan include multiple-choice, short-answer,

essay questionsQuizzes are closed-book, 10 minutesMid-term is 70 minutes open-book in class

(multiple-choice or short-answer only)Final is 150 minutes open-book during exam

periodYou may use point-form answers instead of

full sentences for short-answer and essay questions

Page 13: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

13 Copyright © 2010 M. E. Kabay. All rights reserved.

Online Discussions

MoodleAccessible through my.norwich.eduWeekly postings of questionsOPTIONALExtra points

Up to 10% of final gradeFun!

Page 14: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

14 Copyright © 2010 M. E. Kabay. All rights reserved.

Extra Work

Ask prof for approvalCan write review articlesSpecial projectsAnything that helps you learnShould be fun!Can compensate for mistakes in some other

area500 words of good writing = 1% on final grade

Page 15: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

15 Copyright © 2010 M. E. Kabay. All rights reserved.

Honesty & AttendanceAll dishonesty will be reported to Academic

Integrity CommitteeCheating in examsInterfering with other

students’ workPlagiarism

Permitted no more than 2 unexcused absencesArriving after sign-in sheet

removed = absentNotification that 3rd unexcused absence

will result in expulsion from course with F grade

Page 16: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

16 Copyright © 2010 M. E. Kabay. All rights reserved.

Introductions & Photos

Background of each studentProf will take

photo to help remember

Mind is going!Brief intro to

professorHopes to

remember his own name

Page 17: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

17 Copyright © 2010 M. E. Kabay. All rights reserved.

The SQ3R Method

SurveyQuestionReadReciteReview

Page 18: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

18 Copyright © 2010 M. E. Kabay. All rights reserved.

Background to SQ3R

Effective studying does not consist merely of reading and rereading

Oberlin College studies in 1960s → SQ3R

Time

Ret

enti

on

Page 19: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

19 Copyright © 2010 M. E. Kabay. All rights reserved.

SQ3R: Survey

1st pass: entire document2nd pass: section3rd pass: chapter4th pass: 1st sentences

of paragraphs

Page 20: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

20 Copyright © 2010 M. E. Kabay. All rights reserved.

SQ3R: Question

Jot down ideasPicturesDiagramsLegends

Page 21: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

21 Copyright © 2010 M. E. Kabay. All rights reserved.

SQ3R: Read

One paragraph at a timeBoldface Italics

Page 22: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

22 Copyright © 2010 M. E. Kabay. All rights reserved.

SQ3R: Recite

After every paragraphStop, look awaySummarize main ideasOwn words If not clear, reread

Page 23: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

23 Copyright © 2010 M. E. Kabay. All rights reserved.

SQ3R: Review

At end of each study periodDailyWeeklyMonthly

Page 24: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

24 Copyright © 2010 M. E. Kabay. All rights reserved.

Readings for Next Class

CSH5 = Computer Security Handbook, 5th Edition by Bosworth, Kabay & Whyne (eds.)

Chapter 1 – History and Mission of Information System Security

Chapter 2 – History of Computer Crime

Page 25: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Introduction IS 340 – Information Assurance Lecture # 1 M. E. Kabay, PhD, CISSP-ISSMP Assoc Prof Information.

25 Copyright © 2010 M. E. Kabay. All rights reserved.

DISCUSSION