-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
218 lines (201 loc) · 9.35 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
<html>
<head>
<style>
body { background-color: white; background-repeat: no-repeat; background-size: cover; }
* { color: black; font-family: "Courier"; }
#stable { margin-top: 20px; height: 500px; overflow: auto; }
#stable th div { position: absolute; margin-top: -20px; }
</style>
<body>
<table width=100% cellspacing=0 cellpadding=0>
<tr><td></td><td><br><br></td><td></td></tr>
<tr><td></td><td> <marquee><b>News:</b> Posted initial <a href="marks.html">marks</a> for Final Exam and course | Posted <a href="vlinks.htm">links</a> to Project Videos</marquee></td><td></td></tr>
<tr><td></td><td> </td><td></td></tr>
<tr><td></td><td bgcolor=black> </td><td></td></tr>
<td width=25%></td><td width=50% style="border: 1px solid black;">
<div id="stable">
<table width=100% cellpadding=10>
<tr><td>
gperkins@uvic:~$ cat course.txt
<br>
<br>
<table width=100%>
<tr><td><b>Instructor:</b></td><td>Gary Perkins</td><td><b>Email:</b></td><td>[email protected]</td></tr>
<tr><td valign=top><b>Course(s):</b></td><td valign=top> SENG 460 & ECE 574</td><td valign=top><b>Text(s):</b></td><td>
<a href="Cybersecurity-9780996498203-no_marks.pdf">Navigating the Digital Age</a> &<br>
<a href="cse-cyber-threat-assessment-e.pdf">Cyber Threats to Canada's Democratic Process</a>
</td></tr>
<tr><td><b>Room:</b></td><td> ECS 116</td><td><b>Date/Time:</b></td><td> 15:30 - 18:20 on Fridays</td></tr>
<tr><td><b>Office:</b></td><td>ECS 116</td><td><b>Date/Time:</b></td><td>After class on request</td></tr>
<tr><td><b>Project:</b></td><td><a href="SENG 460 - ECE 574 - Project 0203.pdf">Link</a> and <a href="vlinks.htm">video links</a> <b></b></td><td><b>Links:</b></td><td><a href="#Links">Websites</a> and <a href="acronyms.html">Acronyms</a> and <a href="marks.html">Marks</a> <b></b></td></tr>
</table>
<br>
<b>Week 1: 01/11</b>
<ul>
<li>Topic(s): Introduction, Getting into a Career in Security, Cybersecurity Threat Landscape</li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 01 - Slides.pdf">Link</a></li>
<li>Assignment: Read Foreword, Introduction, Chapters 1-5</li>
</ul>
<b>Week 2: 01/18</b>
<ul>
<li>Topic(s): Attacks, Breaches, Best Practices, Prevention</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 02 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 02 - Slides.pdf">Link</a></li>
<li>Assignment: Read Chapters 6-12</li>
</ul>
<b>Week 3: 01/25</b>
<ul>
<li>Topic(s): Privacy (Guest: Matt Reed), <b>Quiz</b>, Risk Management, & the Board</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 03 - Review.pdf">Link</a> and <a href="SENG 460 - ECE 574 - Lecture 03 - Reading Review.pdf">Link</a></li>
<li>Quiz: to occur after the break and covers Lectures/Slides/Reading (multiple choice, true/false, fill in the blank)</li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 03 - Slides.pdf">Link</a></li>
<li>Assignment: Read Chapters 34-39</li>
</ul>
<b>Week 4: 02/01</b>
<ul>
<li>Topic(s): Incident Handling/Incident Response</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 04 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 04 - Slides.pdf">Link</a></li>
<li>Assignment: Read Chapters 13-14 plus Threats to Canada's Democratic Process</li>
</ul>
<b>Week 5: 02/08</b>
<ul>
<li><b>NOTE:</b> No class in ECS116 this week. <br>Instead attend the Privacy & Security Conference from 2:15-4:30 pm</li>
<li>Topic(s): Field Trip - Privacy & Security Conference, Threats to the Democratic Process</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 05 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 05 - Conference.pdf">Link</a></li>
<li>Assignment: Prepare for Midterm</li>
</ul>
<b>Week 6: 02/15</b>
<ul>
<li>Topic(s): Midterm 15:30 - 17:00, Risk Management lecture 17:20 - 18:20</li>
<li>Quiz Review: <a href="SENG 460 - ECE 574 - Quiz Review.pdf">Link</a></li>
<li>Midterm: Multiple choice and true/false</li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 06 - Review.pdf">Link</a></li>
<li>Assignment: Read Chapters 15-19</li>
</ul>
<b>Week 7: 02/22</b>
<ul>
<li>Topic(s): Reading Break</li>
<li>Presentation: None</li>
<li>Assignment: None</li>
</ul>
<b>Week 8: 03/01</b>
<ul>
<li>Topic(s): Big Data, Privacy, Insurance... Headlines, Breaches, Demos, Polices, Standards, Audits, Darknet</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 08 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 08 - Slides2.pdf">Link</a></li>
<li>Exercise: Check this <a href="matrix.jpg">image</a> for any hidden messages</li>
<li>Assignment: Read Chapters 20-24</li>
</ul>
<b>Week 9: 03/08</b>
<ul>
<li>Topic(s): Cyberespionage, Vulnerability Scans, Penetration Testing, Identity, Information Classification</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 09 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 09 - Slides2.pdf">Link</a></li>
<li>Assignment: Read Chapters 25-28</li>
</ul>
<b>Week 10: 03/15</b>
<ul>
<li>Topic(s): Quiz, Access Control, Identity, Cryptography, Encryption, PKI</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 10 - Review.pdf">Link</a></li>
<li>Quiz: to occur before the break and covers Lectures/Slides/Reading (approx 30 marks, multiple choice, true/false) from Feb 15 to Mar 08 and Chapters 15-24</li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 10 - Slides3.pdf">Link</a></li>
<li>Assignment: Read Chapters 29-33</li>
</ul>
<b>Week 11: 03/22</b>
<ul>
<li>Topic(s): Internet of Things (IoT), Cloud Security, Mobile Security, Privacy Law, Business Continuity Planning (BCP), Disaster Recovery Planning (DRP), Supply Chain</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 11 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 11 - Slides.pdf">Link</a></li>
<li>Assignment: Read Chapters 40-41</li>
</ul>
<b>Week 12: 03/29</b>
<ul>
<li>Topic(s): How to build security into the organization </li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 12 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 12 - Slides.pdf">Link</a></li>
<li>Project: Project is due March 29th</li>
<li>Assignment: Read Chapters 42-46</li>
</ul>
<b>Week 13: 04/05</b>
<ul>
<li>Topic(s): Quiz, Special Topic</li>
<li>Review: <a href="SENG 460 - ECE 574 - Lecture 13 - Review.pdf">Link</a></li>
<li>Presentation: <a href="SENG 460 - ECE 574 - Lecture 13 - Slides2.pdf">Link</a></li>
<li>Assignment: Prepare for Final</li>
</ul>
<b>Final Exam: 04/18</b>
<ul>
<li>Date/Time: Apr 18 @ 14:00 - 17:00</li>
<li>Location: ECS 123</li>
<li>Review Material: <a href="SENG 460 - ECE 574 - Final Exam - Review.pdf">Link</a></li>
<li>Format: Final exam is cumulative for the course. Multiple choice and true/false with scenarios.</li>
<li>Sample scenario:
<br><br>
Bob launches a new website for his company. Bob calls security expert Mary to ask if there's anything he should have done around security. Mary informs him yes that he should have.
<br>
1. Implementing the website has increased the risk to Bob's company
<br>
a. True
<br>
b. False
<br><br>
2. What should Bob have considered when building the new website?
<br>
a. security by design
<br>
b. secure coding
<br>
c. whether any sensitive information would be on the website
<br>
d. whether to use an SSL certificate
<br>
e. all of the above
<br><br>
3. When should Bob have conducted a web app vulnerability scan? (choose two)
<br>
a. before starting to build the website
<br>
b. before launching the website on the internet
<br>
c. during launching the website on the internet
<br>
d. after launching the website on the internet
<br>
e. the website doesn't require a vulnerability scan
<br><br>
4. Bob finds that the database his website uses is missing a table that was there previously. What kind of attack did Bob's website permit that is the most likely cause of this problem?
<br>
a. XSS
<br>
b. buffer overflow
<br>
c. SQL injection
<br>
d. DDoS
<br>
e. CSRF
<br><br>
</li>
<li>Length: 3 hours</li>
<li>Notes: Closed book. Remember to bring ID.</li>
</ul>
<b><a id="Links"></a>Links:</b>
<ul>
<li><a href="https://en.wikipedia.org/wiki/Information_security">Wikipedia - Information Security</a></li>
<li><a href="https://www2.deloitte.com/content/dam/Deloitte/ca/Documents/risk/ca-cyber-talent-campaign-report-pov-aoda-en.PDF">Deloitte - The changing faces of cybersecurity</a></li>
<li><a href="https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf">Herjavec - 2019 Official Annual Cybercrime Report</a></li>
<li><a href="https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/">Information is Beautiful - World's Biggest Data Breaches/Hacks</a></li>
<li><a href="http://www.digitalattackmap.com/">Digital Attack Map</a></li>
<li><a href="http://www.shodan.io/">Shodan</a></li>
<li><a href="Learning about Industrial Control Systems Security.pdf">Industrial Control Systems Security</a></li>
</ul>
gperkins@uvic:~$
<br>
</td></tr></table>
</td><td width=25%> </td></tr>
<tr><td></td><td> </td><td></td></tr>
</table>
</body>
</html>