Documente Academic
Documente Profesional
Documente Cultură
Albert Kinney Department of Computer Science and Electrical Engineering University of Maryland Baltimore County E-mail: alkinney@umbc.edu
Course Prerequisites
CYBR 620: Introduction to Cybersecurity. Students should have a conversational understanding of basic computer and network communications protocols, vulnerabilities, and security mechanisms.
Course Description
CYBR 622 will provide an overview of cyber capabilities and trends in the global community including both nationstates as well as non-state actors. This course involves review and research of stated, discovered, or assessed cybersecurity capabilities, strategies, and policies across the global community. As information is available, the course will perform comparative analysis of international cybersecurity policies along with capability maturity assessments. The course will culminate in a cybersecurity policy exercise where students will develop further insight to the implications of various courses of action in the context of a dynamic global cybersecurity environment.
Course Textbooks
REQUIRED Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Jason Andress (Author), Steve Winterfeld (Author) Paperback: 320 pages Publisher: Syngress; 1 edition (June 1, 2011) ISBN-10: 1597496375 ISBN-13: 978-1597496377
REQUIRED Mapping Security: The Corporate Security Sourcebook for Today's Global Economy Tom Patterson (Author), Scott Gleeson Blue (Author) Paperback: 432 pages Publisher: Addison-Wesley Professional; 1 edition (December 24, 2004) ISBN-10: 0321304527 ISBN-13: 978-0321304520 *********** Various readings from current periodicals and government publications
Course Format
The course will be a combination of lecture, classroom discussions, and student-led presentations. This course is formatted for a normal semester. Sessions are nominally 2:45 hours in length and scheduled once per week.
Course Requirements
Course Grading Scale
Course work Classroom & Online Leadership Mid-Term Exam Research Paper Final Exam Grade distribution 20 % 30 % 20 % 30 %
Final grade will computed as follows: 90%-100% 80%-89% 70%-79% 60%-69% <60% A B C D F
Assignments
CLASSROOM & ONLINE LEADERSHIP - CURRENT EVENT PRESENTATIONS AND DISCUSSIONS Because the UMBC Cybersecurity Strategy & Policy program aims to develop leaders to fill critical industry and government roles, portions of this course will provide opportunities for students to actively engage one another on relevant issues of the day. In addition to engaging the class in through both in-person and virtual means, each student will present one individual-effort discussion devoted to exposure of a current global cybersecurity issue, event, or technology based upon their reading of current news and periodical sources. This brief presentation shall be structured to communicate the most important aspects of the material within a 5-7 minute timeframe. Media resources (i.e. PowerPoint) shall NOT be used during this presentation it is simply a speech communication. Students shall communicate a concise and balanced summary of the material. The highest-scoring presentations will include a provocative set of questions related to the topic, thereby allowing classmates to engage the issue through debate and commentary. The most successful presenters will: quickly identify the most essential information about their topic concisely organize information enabling others to promptly grasp fundamental concepts efficiently research opposing technology, management, and business trends brainstorm effective methods to draw out classroom discussion and develop dialogue on meaningful issues Presentations will occur at the beginning of each class period with several students being heard during each meeting. Dates for individual presentations will be assigned by the instructor.
CYBER POWER FRAMEWORK ANALYSIS - GROUP RESEARCH PAPER (w/Individual Accountability) Each group shall conduct a significant scholarly investigation and produce an in-depth, postgraduate-level Cyber Power Framework Analysis paper expressing their perspective in a minimum of 20 pages and maximum 30 pages covering only the main body of the paper. See below for additional administrative details. The CYBR 622 Cyber Power Framework Analysis paper will be a thoughtful, well-researched, and accuratelyreferenced document exploring a framework of cybersecurity topics as they pertain to a specific country, region, or defined grouping of international sovereigns. The specific framework outline will be provided by the instructor during the first classroom session. All groups shall follow the same outline. Groups will consist of 4 or more individuals randomly selected by the instructor. The team will assign sections of the paper to individual authors during the first 2 weeks of the course. Group collaboration is encouraged especially concerning aspects related to smoothing the final document into a cohesive study (grammar, format, tone, active/passive voice). However, each author will be graded on their assigned portion of the paper. NOTE The Cyber Power Framework Analysis paper will contain information about each portion of the given framework, but the paper will NOT contain an introduction or a concluding analysis. Instead, each student will write an individual conclusion to the paper, which will serve as their Final Exam. The research paper shall adhere to the following format: 1) 2) 3) 4) Cover/Title Page (1 page) Table of Contents (1 page) Body of the paper (min 20 pages, max 30 pages) Bibliography MLA standard (pages as required)
5) Appendices not required, but should be used when significant graphics, tables, or quoted material would disrupt the flow of the main paper (pages as required). 6) Arial or Times New Roman 12-point font, single spaced 7) 1 Margins on all sides of the page 8) Justified alignment of paragraphs **Each team shall submit a FINAL VERSION of their RESEARCH PAPER to the instructor via hard copy AND e-mail on or before the due date indicated in the syllabus.** EXPECTATION: This paper will be completed on time. This paper will be written to postgraduate-level standards with regard to fundamental mechanics and thorough analysis. **Each team shall submit and present a 15-minute Powerpoint presentation to the class covering their Cyber Power Framework Analysis paper.
MID-TERM EXAMINATION The Mid-Term Examination shall adhere to the following writing formats: 1) Concise answers to questions, 1 question per page 2) Arial or Times New Roman 12-point font, single spaced 3) 1 Margins on all sides of the page 4) Justified alignment of paragraphs 5) Bibliography as needed MLA standard Each student shall participate in the scheduled Mid-Term Examination for this course. The examination will be conducted outside the classroom and will primarily consist of essay questions related to material covered to that point in the course. Students can expect test questions addressing open-ended issues that may have several potential correct solutions. Students may reference other materials in preparing their exam, but may not collaborate with another UMBC student accordingly, all materials should be properly referenced. EXPECTATION: An answer to any essay question should not require more than 1 page of writing. The primary measure of success will center on how well the student demonstrates critical thinking skills in a concise and focused response to the question, regardless of whether the professor agrees or disagrees with the students technical answer.
FINAL EXAMINATION The Final Examination shall adhere to the following writing formats: 1) Concise answers to questions, 1 question per page 2) Arial or Times New Roman 12-point font, single spaced 3) 1 Margins on all sides of the page 4) Justified alignment of paragraphs 5) Bibliography as needed MLA standard Each student shall participate in the scheduled Final Examination for this course. The examination will be conducted outside the classroom and will consist of each individual student writing a Risk Profile Conclusion based upon their Group Research Paper. The Risk Profile Conclusion shall contain the following sections: 1) Business Risk an assessment of the overall cyber risk of conducting business in that country or region 2) Crime/Terror Risk an assessment of the overall risk of that country or region harboring cyber crime/terrorism 3) Global Supply Chain Risk an assessment of the overall cyber supply chain risk from that country or region 4) Cyber War Risk an assessment of the overall risk of that country or region initiating a cyber war
5) Espionage Risk an assessment of the overall risk to global government & business intellectual property from that country or region Students may reference other materials in preparing their exam, but may not collaborate with another UMBC student accordingly, all materials should be properly referenced. EXPECTATION: Each section of the Risk Profile Conclusion should require 1-2 pages of writing. The primary measure of success will center on how well the student demonstrates critical thinking skills in a concise and focused response to the question, regardless of whether the professor agrees or disagrees with the students technical answer.
Course Policies
Course Work
Fourth-year college student writing is the minimum acceptable quality for course deliverables. Failure to complete the required in-class presentation results in the loss of the entire associated grade. Late assignments are not accepted unless an extension is preapproved by the instructor. There are no provisions for extra credit in this course.
Academic Integrity
By enrolling is this course, each student assumes the responsibilities of an active participant in UMBCs scholarly community in which everyones academic work and behavior and held to the highest standards of honesty. Cheating, fabrication, plagiarism, and helping others to commit these acts are all forms of academic dishonesty, and they are wrong. Academic misconduct could result in disciplinary action that may include, but is not limited to, suspension or dismissal. To find useful information about avoiding plagiarism infractions through appropriate citations, or to read the full policy regarding student academic misconduct for the graduate school, please see http://www.umbc.edu/provost/integrity.
CYBR 622 Introduction Framework for International Patterson - Forward, Ch 2, Ch 3 Capabilities Assessments
2 Planning & Research Assignments Feb 8 Mapping Security Index STUDENTS ONLY Competition Between Sovereign States
Patterson Ch 8, CH 18
Winterfeld Ch 1, Ch 2
Internet Governance Internet Governernce in an Age of Cyber Knake pp 1 - 27 Insecurity Group Assignment Plans Due ****************** Group 1 PRESENTATIONS ******************
4 Feb 22 Virtual
Patterson Ch 6, Ch 7 Winterfeld - Ch 5
Winterfeld Ch 3
******************
Winterfeld Ch 4
Group 3 PRESENTATIONS
******************
Cybersecurity & Freedom Privacy, Censorship, & Civil Liberties on TBD a Global Scale Group 4 PRESENTATIONS ******************
8 Mar 28 F2F
Computer Network Operations (CNO) Computer Network Exploitation Computer Network Attack Computer Network Defense
***
Group 5 Presentations
9 Apr 4 F2F
Winterfeld Ch 11
10 Apr 11 F2F
Winterfeld Ch 6 Patterson Ch 14
11 Apr 18 Virtual
12 Apr 25 F2F
Patterson Ch 15 Patterson Ch 17
***
Technical & Business Considerations Outsourcing Mapping Technology Final Exams Due on May 2
14 May 9 F2F
15 May 16 F2F