Homeworks


·      HW 2: Added onMarch 7 (Survey analysispaper on Risk management)

·      Youare expected to extensively search IEEE, ACM, Springer, Elsevier, NISTpublications and white papers and reports from industry

·      Due:April 5, 2014

·      HW 1: Added onJan 20 (Analysis of Pitt’s Policy; Review of 2 papers)

Reading materials for HW 1

·        Paper 1: Information Security management: A humanchallenge?

·        Paper 2: An integrated system theory of informationsecurity management

SampleTemplate, Samplereview

 


Lab Assignments

·        Lab 3 (Hands-on 5): NetworkForensics  (Due on April 12)

·        Lab Assistant: Sean Hutchinson

·        Lab 2 (Hands-on 3 and 4): Malware Analysis & Network SecurityAssessment (Two parts focused on EIGER virus)

·        Lab Assistants: SheldonSensenig & Joel Land

·        Note: ExtraLab during CSSD Visit (Hands-on 2): CSSD Computer Forensics exercise(Courtesy of John Franolich, GCFA)

·        Host andNetwork Forensics – focused on Zeus malware

Learning goals

-       Host and memory forensics

-       Network forensics

-       Malware analysis

·        Use ofCrypto and tools include: ghex, gedit,Wireshark, Python

·        Lab 1 (Hands-on 1): HostForensics + Supplement

·        Lab Assistant: Sean Hutchinson

-        


 Paper Presentation/Reviews (TBA)