Weekly Topics | |
---|---|
Week 1: Introductions & Pscyhology | |
13 January Introductions |
Course Policies and introductions (20 min) - Sign up for research gate: it is free! Security Careers in-class activity (20 min) - if necessary Create a linked in profile - View and edit one other person's profile in the class - Discuss the task for which you should be recommended by this person, and what you would recommend for them. - Consider mutual recommendations |
15 January Psychology of Security |
Reading 1
Modic, D., & Anderson, R. (2014). Reading this may harm
Garg, V., & Camp, J. (2013). Heuristics and biases:
You've Been Phished! - National Institute of Standards and Technology
Thinking Fast and Slow - Daniel Kahneman |
Week 2: Pscyhology of Privacy | |
20 January | Martin Luther King Day |
22 January Pscyhology of Privacy |
Teams Assigned Reading 1
Connelly, K., Khalil, A., & Liu, Y. (2007, September). Do I do
Rashidi, Y., Ahmed, T., Patel, F., Fath, E., Kapadia, A., Nippert
Password Security Fatigue - National Institute of Standards and Technology |
Week 3: Methods | |
27 January |
Reading 1
Montangero, S., Vittone, F., Olderbak, S., & Wilhelm, O. |
29 January |
Reading 1
Quality Research for Education - Robert C. Bogdan & Sari Knopp Biklen
Interviewing as Qualitative Research (3rd Edition)- Irving Seidman |
Week 4: Value of security & privacy | |
3 February Value of Security |
Reading 1
Chapter 4 of Computers at Risk: Safe Computing In the
The Value of a Hacked Email Account - Kerbs On Security
Bruce Schneier part 6 of 18 - Security theater - estpictures |
5 February Value of privacy |
Project Plan Reading 1
Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is
Danezis, G., Lewis, S., & Anderson, R. J. (2005, June). How |
Week 5: Economics topic selected | |
10 February Economics of Security |
Reading 1
Anderson, R., & Moore, T. (2006). The economics of |
12 February Economics of Privacy |
Reading 1
Odlyzko, A. (2004). Privacy, economics, and price
Your privacy on Facebook: What you need to know - WFLA News Channel 8 |
Week 6: Historical Perspectives | |
17 February Law, Security a Historical View |
Reading 1
Appendix A The Orange Book of Computers at Risk: Safe
Pick a vulnerability and map it using the the link below
The Enigma Machine explained - Science Museum |
19 February Privacy a Historical View |
Reading 1
The Right to Privacy - Warren and Brandeis
Fair Information Practice Principles
Anthony Comstock: American Prude - Erik Loomis (www.lawyersgunsmoneyblog.com)
Hamilton - We Know
Hamilton - The Reynolds Pamphlet |
Week 7: Law and Economics | |
24 February Security Law Current Debates |
Reading 1
Information Security Law - Steven Robinson Part 1 https://www.symantec.com/connect/articles/us-information-security-law-part-2 |
26 February Organizations |
Reading 1
Lacey, D. (2010). Understanding and transforming
Wall, D. S. (2013). Enemies within: Redefining the insider
Insider Threat Animation Part 1: What is Insider Threat? - Seccom Global |
Week 8: Transparency | |
2 March Privacy in Organizations: |
Reading 1
Mitrou, L., & Karyda, M. (2010). Bridging the gap between
Privacy Rights vs. Employee Tracking - KPBS |
4 March Privacy on the Network |
Reading 1
Davis, T., Peha, J. M., Burger, E. W., Camp, L. J., & Lubar, D.
PRIVACY = Freedom & Liberty | Ann Cavoukian | TEDxVaughanWomen (up to 5:00) |
Week 9: Policies | |
9 March Security Policies |
Bibliography Reading 1
Parkin, S., Fielder, A., & Ashby, A. (2016, October). Pragmatic
Florêncio, D., & Herley, C. (2010, July). Where do security
Talk About IT - IT Security Policy & Risk Assessment |
11 March Privacy Policies |
Reading 1
Cranor, L. F., Hoke, C., Leon, P., & Au, A. (2014, March). Are
Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The
Google Privacy Policy Update - Google |
Week 10: Spring Break | |
Week 11: Privacy Compliance CANCELED BY IU | |
23 March Certificate Fraud CANCELED BY IU |
Reading 1
Kristian Koz at al, Issued for Abuse: Measuring the
Reading 2
Vratonjic, N., Freudiger, J., Bindschaedler, V., & Hubaux, J. P. (2013). |
25 March Security Compliance CANCELED BY IU |
Reading 1
Parkin, S., Fielder, A., & Ashby, A. (2016, October). Pragmatic
BSidesSF 2018 - Hacking the Law: Are Bug Bounties a True Safe Harbor? (Amit Elazari) |
Week 12: E-Crime | |
30 March E-Crime |
Reading 1
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten,
Garg, V., & Camp, L. J. (2015). Why cybercrime?.
First ever Risky.Biz YouTube rant with Patrick Gray - Risky Business (Up to 3:00) |
1 April E-Crime |
Reading 1
Kreibich, C., Kanich, C., Levchenko, K., Enright, B., Voelker,
Koshy, P., Koshy, D., & McDaniel, P. (2014, March). An
An undertaking of great advantage, but nobodyto know what it |
Week 13: Threat Modeling | |
6 April Threat Modeling |
Guest: Dr. Bob Blakley,
Threat Modeling: What, Why, and How?
The Value of a Hacked Company - Kerbs On Security |
8 April Threat Modeling Social Media |
Guest:Gale Pomper
Chapter 1 of
Chapter 2 - Psychology of Deception |
Week 14: Security & Privacy System Design | |
13 April System Design Security |
Guest: Dr. Mary Ellen Zurko,
Sasse, M. A., & Flechais, I. (2005). Usable security: Why do
Vaniea, K. E., Rader, E., & Wash, R. (2014, April). Betrayed by
IoT security in the Digital Enterprise: Security by Design - HPE Technology |
15 April System Design Privacy |
Guest: Dr. Adam Tagert,
Cavoukian, A., Taylor, S., & Abrams, M. E. (2010). Privacy by
Hong, J. I., Ng, J. D., Lederer, S., & Landay, J. A. (2004, August).
Privacy by Design - Dr. Ann Cavoukian (CABAConf) |
Week 15: Bitcoin & Management | |
20 April Bitcoin |
Guest: Behnood Momenzadeh,
Ross Anderson, Ilia Shumailov and Mansoor Ahmed,
Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." |
22 April Supply Chain Security |
Guest: Gary M. Deckard,
Shackleford, Dave. "Combatting cyber risks in the supply chain." SANS. org (2015).
Obama, Barack. "National strategy for global supply chain security." The White House (2012). |
Week 16:Industry-Level Issues and Challenges | |
27 April Cryptography |
Reading 1
James Bryce Clark, Technical Standards and Their Effects on E-Commerce Contracts:
Cryptography in the era of quantum computers |