Notes

Day 1 - Introduction

Syllabus overview and expectation of class

Nothing special

Day 2 - Chapter 1

Project

The company under review must not be associated with Mississippi State University.
Groups will be decided on Monday.

Slide Notes

This is not hacking 101.
We are trying to wrap our head around how we protect information and what business decisions are made in this process

Outline

Security in a nutshell

Subjects are allowed or denied access to an object.

Subjects

The user/process/system requesting access to a protected resource

Objects

The protected resource

CIA Triad

Confidentiality

Violation of Confidentiality

Integrity

Violation of Integrity

Availability

Violation of Availability

CIA Triad + 1

Agility (Harvard Business School)

Other Security Concepts

Privacy

Accountability

Nonrepudiation

Data Classification

A realistic means of securing data based on its “value”

Useful for:

Hierarchical View of Data

Data Classification

Government/Military

Business/Corporate

Security Standards

National Institute of Standards and Technology (NIST)
International Organization for Standardization (ISO)
International Society for Automation (ISA)

Federal & State Laws

 

Day 3 - Chapter 13

Assignments

First assignment will be discussed in next class

Notes

 

Day 4 - Ch13 cont. & Ch 11

Exam Hints:

Stack Layer model layers

Exam 2 notes

Four main functions of applications:

  1. Input
  2. Output
  3. Processing
  4. Storage

Chapter 21, 20,7,6
Sets 007-011