18
Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct of the Course Exams Course Materials Grading Peer Evaluation How to succeed in this course

Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Embed Size (px)

Citation preview

Page 1: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Introduction to CIS 8082: Security of Networked Information Systems

• Course Objectives (this is an experimental course)

• Group Formation and Function• Conduct of the Course• Exams• Course Materials• Grading• Peer Evaluation• How to succeed in this course

Page 2: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Course Objectives

• Course Syllabus http://www.cis.gsu.edu/~cstucke/cis8082/cis_8082e.htm

• Objectives:1. The overall structure of IP networks 2. The general architecture of networked systems 3. The nature of common network hazards 4. The basic operation and limitations of common network

safeguards 5. The function, capability, and configuration of security

architecture components

Page 3: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Groups

• Group Formation (http://cis.gsu.edu/~cstucke/cis8680/content/teamdyn.pdf )

• 3-4 people per group (form these in the next 7 days)

• Each session select a designated group spokesperson

• Group work:Session participationLabs (& lab creation/improvement)Network Security Issues Term Paper (or lab creation)

Page 4: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course

• WebCT• vClass• Microsoft Conferencing Server• Invited speakers (Maybe)

• Chat etiquette• Sample session schedule:

4:30-4:40 Action Items from last session4:40-5:50 Group/Speaker/Instructor led session5:50-6:00 Break6:00-6:25 Group: develop & post case analysis6:25-6:40 Group: analyze & rate other analyses6:40-7:00 Groups present ratings

Page 5: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course: WebCT

• Enter CIS8082 WebCT Vista site (http://webct.gsu.edu/webct/public/home.pl?action=print_home,

select Vista, login, select CIS8082)• Use for Exams, Bulletin Board, out of

class chats, mail, group project postings, and more

• Browser/computer help with Vista:http://www2.gsu.edu/~wwwvst/help/browserproblems.html

Page 6: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course: vClass

• Login vClass http://www.elluminate.com/member.jsp (screen shots follow)

• Join CIS 8082 - STUCKE • Chat etiquette

1. Group spokesperson does posting in chat (not necessary for our size class)

2. No more than 3-4 outstanding questions at a time3. When you want to respond to a comment made earlier but don't want the comment assumed to be part of the current discussion, preface your comment with "re subject" or "re author:" 4. When you want to indicate that you have more to say on the subject, end your comment with "...".

• vClass info at http://www.gsu.edu/~wwwets/instructionalsupport/vclass/participants/index.html

Page 7: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course: Login vClass

Login vClass at http://www.elluminate.com/member.jsp

Page 8: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course: Join CIS 8082 - STUCKE

Page 9: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course: Participant Screenhttp://www.gsu.edu/~wwwets/instructionalsupport/vclass/participants/participant_quickref.pdf

Page 10: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course: WebCT Vista

• Session Objectives• Links to chats for replay• Individual group (presentation

group) areas• Bulletin Board• Mail• Other facilities shown on home page

Page 11: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Conduct of the Course: MCS

• Microsoft Conferencing Server (under repair at the moment)

http://hooch.cis.gsu.edu/conferencing/default.asp?select=2

• Is our backup chat location if vClass and WebCT are down

• Be sure you can enter and participate in the audio conference (when the server returns…. )

Page 12: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Exams

• Mid-term and Final Exams• On-line using WebCT• Open notes and course materials• No other help (direct or indirect

during exam period)• Sample of exam format in WebCT

(not there yet)

Page 13: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Course Materials

• Course Materials at http://cis.gsu.edu/~cstucke/cis8680/content/networks/

• Username and Password required (I’ll give you these in the first session.)

• Materials subject to change during course (this is an experimental course… )

• Finding (or developing) better materials (labs, presentations, tutorials) is a major participation plus (post these on the WebCT bulletin board)

Page 14: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Grading

• The syllabus is the official document for all course information

• The two Individual Exams are each 20% of final grade

• Group Lab Development / Network Security Issues Term Paper is 20%

• Group Labs (and possible a Case Study) is 20%• Group participation is 20%• Individual scores for group work are the group

score * peer evaluation

Page 15: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Peer Evaluation

• Done at mid-term and end of course• The mid-term score is initial formal feedback• The end-of-course score is averaged with the

mid-term score for use in grade calculation• The peer evaluation can make letter grade

differences in your final grade• Be a strong team player• Give honest feedback. Do not surprise anyone with

their end-of-course peer evaluationhttp://cis.gsu.edu/~cstucke/cis8082/PeerEvaluation8082.htm

Page 16: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Information Security Lab (ISL)

• Server based lab operated by the CIS department.

• Intended to demonstrate potential security threats and associated preventive measures via hands-on exercises.

• ISL is work-in-progress being driven by Dave Bloomquist (thanks!). Any suggestions or offers of assistance are appreciated.

• ISL is accessed remotely via Cisco VPN client.

• Please review “white hat” agreement prior to accessing the lab. Please do not change any configuration settings.

Page 17: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

How to Succeed in this Course

• Study schedule-linked materials before sessions• Actively participate as a group both in sessions

(observing class etiquette), labs, & in posting materials

• Produce group labs, studies, papers, and presentations that exceed requirements and the previous classes’ products (when these exist)

• Carry your part of the group’s work (and be sure your group understands your contributions)

• Excel on exams (especially scenarios/labs) by understanding course concepts and their application

Page 18: Introduction to CIS 8082: Security of Networked Information Systems Course Objectives (this is an experimental course) Group Formation and Function Conduct

Q&A