Week 1

Week 2

Assignment 1 - Phishing Report

Email subject / File name: IS375-AGN-1-YourName.pdf

Assume you have just been employed by a leading financial institution as an information security consultant. Your first assignment is to write a report about phishing. Your report has to cover the following:

  1. the origin of the term, "phishing"
  2. the threats phishing poses to individual employees and the company as a whole
  3. a detailed list of mechanisms (3 or more!) that are available to counter phishing

The report should be around 1 page in length, and based on at least 3 different (properly referenced) sources. The report should be structured logically, with clearly identified sections, so that it is easy to follow and understand.

Deadline: 23 June 2015 11:59 pm

Week 3

Assignment 2 - Extended Whitman's Formula

Email subject / File name: IS375-AGN-2-YourName.pdf

Calculate the risk of the following table of assets using extended Whitman's formula: R=P×V×(1−CC+UK)

Table of Assets. All values are 95% correct (UK = 0.05)
Table of Assets. All values are 95% correct (UK = 0.05)

Deadline: 30 June 2015 11:59 pm

Week 4

Assignment 3 - Access Control Model

Email subject / File name: IS375-AGN-3-YourName.pdf

A class has two professors (Prof. Alice and Prof. Bohb), a Teaching Assistant (Chuck), a grader (Jimbo), and a number of students. There are 3 folders maintained by the class:

  • An Exam folder
  • An Assignment folder
  • A Submission folder

The access controls for the folders are:

  • The professors can create, edit, read, write and share in the Exam and Assignment folder, but can only read from the Submission folder.
  • The TA can create, edit, read, write Assignments, read Exams, and read from the Submission folder.
  • The grader can only read from the Submission folder.
  • The students have only write access to the Submission folder.

Questions:

  • Design an access control system for this environment in the form of an Protection Bits!
  • Design an access control system for this environment in the form of an Access Control List!
  • Would the access control for this environment benefit from being implemented as an RBAC system? Explain!

Deadline: 7 July 2015 11:59 pm

Week 5

Assignment 4 - Firewall Rule

Email subject / File name: IS375-AGN-4-YourName.pdf

Rules for firewall (192.168.120.1) on network 192.168.120.0


Explain this firewall rule! Is the firewall strict or lenient?

Deadline: 14 July 2015 11:59 pm

Week 6

Assignment 5 - Your Digital Trace

Email subject / File name: IS375-AGN-5-YourName.zip

Take a photograph of the following:

  • Most recent browsing history
    • Save Name: 1-Browser-History.jpg
  • Running process in Task Manager
    • Save Name: 2-Task-Manager.jpg
  • System Information
    • Start > Run > regedit
    • Navigate to: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\ CurrentVersion
    • Click on the “CurrentVersion”
    • Take the photograph.
    • Filename: 3-System-Information.jpg
  • Time Zone Information
    • Start > Run > regedit
    • Navigate to: HKEY_LOCALMACHINE\System\ControlSet001\Control\ TimeZoneInformation
    • Click on the “TimeZoneInformation”
    • Take the photograph.
    • Filename: 4-TimeZone-Information.jpg
  • Application Logs
    • Run Event Viewer (you'll need to find it!)
    • Navigate to: Windows Logs\Application
    • Click on the “Application”
      • Wait a few moments until the list is displayed
    • Take the photograph.
    • Filename: 5-Application-Logs.jpg


Rules:

  • Said applications must be running full-screen
  • Ensure a high quality photo result
  • Send a ZIP file
  • Deadline is next week
  • Mismatching email subject and/or filename will be penalized


Deadline: 23 July 2015 11:59 pm

Week 7

Week 8

  Final Term Test

Score (2015-S)

  • PRE = Pretest, no effect to the grade
  • ABS = Absence (Class Presence)
  • PRO = Project / Assignments
  • MID = Middle Term
  • PTQ = Post-Test / Quiz
  • FIN = Final Term