SENECA COLLEGE           Business Intelligence Research Analyst Program
B.I.T.   801 RISK AND THREAT ASSESSMENT
This course examines risk and threat assessment from human, technological and environmental circumstances. Procedures, policies & techniques and countermeasures to assess risks levels and quantify threats. Focus on the ability of an organization to maintain business intelligence in the face of the growing intensity of global challenges. Topics include hacking, penetration testing, intrusion investigation, countermeasures, biometrics, cryptography, identity theft, DNS attacks, scams and viruses & firewalls. This subject is focused on a non-technical security perspective but some technical explanations will be available for enrichment.
..
primary text
http://www.course.com/catalog/product.cfm?category=Security&subcategory=Security&isbn=0-619-06318-1
 
secondary text
http://vig.prenhall.com/catalog/academic/product/0,1144,0131866915,00.html
secondary text
http://www.mhhe.com/business/accounting/greenstein2e/
 
reference text
reference text
http://www.counterpane.com/
Principles of Information Security
(2nd Ed. used 2008)
(3rd Ed. for 2009)
Whitman & Mattord
ISBN 0-619-06318-1
Security Policies and Procedures 
by Sari Greene
ISBN 0-13-186691-5
Electronic Commerce: Security, Risk Management, and Control
(2nd Ed. used 2008)
by Greenstein
 
Internet Law in Canada
3rd Edition by Geist
ISBN 1-55322-047-1
Secrets & Lies
by Bruce Schneier www.schneier.com
also www.counterpane.com
using chapters 
1,3,4, 7, 8
using chapters 
3, 4, 5, 7, 8, 9, 11, 13
using chapters 4,7,8,9,10,11, 12 using chapters 
3, 6, 15, 19, 20
As Taught by Prof. Tim Richardson School of Marketing and e-Business, Faculty of Business
last updated 2008 April 01
Section 1 Section 3 Section 4 Section 5 Section 6
 o Risk
 o Threat
 o Vulnerability
Fundamentals (Jan 08)

Schneier Chpt 3
Types of Attacks
--------------------------------------------
Asset Classification
- what is at risk
- terms used
Greene Chpt 5 (Jan 15)
Whitman Chpt 4 (Jan 08)
-------------------------------------------
Types of Threats & Attacks
Greenstein Chpt 7(Jan 22)
- Phishingp. 218 
- Cookiesp. 220 - 223
- DNS - Denial of
Service Attacks p. 224 - 225
- Social Engineering p. 233 - 234
- viruses p. 242 - 244
--------------------------------------------
Schneier Chpt 19 (Feb 5)
Threat Modelling & Risk Assessment
--------------------------------------------
 
 
 
 
 
 
 

 

Greene Chpt 4
Schneier Chpt 20(Feb 5)
(handed out Jan 31)
Security Policies
and Countermeasures
 oHoney Pots
 oPatches
 oBiometrics
-------------------------------------------
Whitman Chpt 5 (Feb 12)
Assessing & Controlling Risk
-------------------------------------------
Whitman Chpt 6 (Feb 19)
Mission, Vision
Strategic Planning
G.O.P.S.T.
----------------------------------------------------
Whitman Chpt 7 (Feb 19)
Greene Chpt 11(Feb 21)
Contingency Planning
 o Incident Response Planning
 o Disasater Recovery Planning
 o Business Continuity Planning
----------------------------------------------------
Greenstein Chpt 8(Feb 19)
(handed out Jan 31)
Risk Management
- Penetration Testing
- (Tiger Teams)
Threat Modeling & Risk Assessment
Risk Assessment
Checklist.doc exercise
(to discuss Feb 19)
TEXAS
www.stac.state.tx.us/
IRAPC/practices/(noted Jan 15)

CALIFORNIA (to discuss Feb 19)
www.oispp.ca.gov/
government/risk/toolkit.asp
-------------------------------------------
Countermeasures: Deterrence
Whitman Chpt 3, p. 98
--------------------------------------------
Greene Chpt 8
SOPs
Standard Operating Procedures
 

Access Control
Greene Chpt 9
Security Processes
 o compartmentalize
 o secure weak link
 o use choke points
 o defense in depth
 o enlist users
 o detect attacks
    Intrusion Investigation
--------------------------------------------
Greenstein Chpt 10
Schneier Chpt 6
Cryptography (Mar 18)
and Encryption
and Authentification
-------------------------------------------
Cryptography Video
(Mar 18)
-------------------------------------------
Identification
and Authentification
 o Confidentiality
 o Integrity
 o Authentification
 o Non-repudiation
Greene Chpt 3
C.I.A. p. 66-71
Whitman Chpt 1
C.I.A. p. 10-13
-------------------------------------------
Greene Chpt 13
Access Controls
 o ICT devices
 o PC workstations
 o Access authentification

Key Management
56 bit / 128 bit key
- Public Key
- Private Key
Schneier Chpt 15
Digital Signatures
Certificate Authorities


email security
. PGP . PEM
Greenstein Chpt 11
Whitman Chpt 8 p. 276-284
Firewall Unit
 o Components
 o Functionality
 o Securing the Firewall
        -policy
        -administration
 o Firewall Limitations
-----------------------------------
Internal Risks and Threats
(Mar 25)
-----------------------------------
Third-Party Risks & Threats
(Mar 25)
Outsourcing(Mar 25)
-----------------------------------
Greenstein Chpt 12
E-payment systems
------------------------------------------
- Criminal Attacks

- Privacy Violations
    - Identity theft
(continuing some things not -discussed in BIT704)
- Spyware

- Publicity Attacks
-----------------------------------
(Apr 01)
- domain name hacking
- scams
- viruses

hacking video

This section is additional supplementary
material


Industry
Associations
 o RSA Security
 o SANS Institute
Gov't response
to intrusion and threats

National Government Involvement in internet crime and e-business security
Guest Speaker
CSIS
RCMP
FBI
- Carnivore
Echelon

Professional
Security
Service
Companies

Jan 8
Jan 15
Jan 15Mini-Assignment # 1 due
Jan 22
Jan 29Mini-Assignment # 2 due
Jan 29 - bad weather
Feb 5
Feb 12
Feb 19
break week Feb 25 - 29th
Mar 4 
Mar 11 Mini-Assignment # 3 due
Mar 18M
Mar 25
Apr 01 
Apr 01 Mini-Assignment # 5 due
Apr 08A
.
.
Mini-Assignment # 1 - in your own words
A - create an example of/ definition of what is a risk
B - create an example of/ definition of what is a vulnerability
write this out, and bring to class Jan 15th and prepare to discuss


TEACHING TOPICS / READING LIST progress BLOG
Jan 8
 
handed out copies of Chpt 4 for discussion


Jan 15
handed out copies of www.oispp.ca.gov/government/risk/toolkit.asp
 
discussed Chpt 4 in class, in detail
v
http://vig.prenhall.com/catalog/academic/product/0,1144,0131866915,00.html handed out copies of Chpt 5 for discussion Jan 22


Jan 22
 
will discuss Chpt 7
copy will be given out in advance
(left them w Jim Davidson to give to you)
v

Jan 25th
based on our extensive discussion of Chpt 7 in Electronic Commerce: Security, Risk Management, and Control by Greenstein

Mini-Assignment # 2 - in your own words
A - Find a real-life example of a company that encountered a risk situation, describe what the threat was, and discuss, if you can tell, whatthe vulnerability might have been to the threat being realized

B - write this out on a page and bring to class Jan 29th
- it is expected that you will be very energetic in your pursuit of a good example and will take more than one or two sentances to describe this



Feb 5th
 
http://www.counterpane.com/ discussed in length Chpt 19 and 20
- including
 oHoney Pots
 oPatches
 oBiometrics


Feb 12th
 
discussed Chpt 5  in class
v
noted Risk AssessmentChecklist.doc exercise - web based resources TEXASwww.stac.state.tx.us/IRAPC/practices/

CALIFORNIA www.oispp.ca.gov/government/risk/toolkit.asp



Feb 19th
 
discussed Chpt 6 (one page re: GOPST)  in class
handed out Chpt 7 for next class March 4th
v
Mini-Assignment # 3

G.O.P.S.T., re-do in your groups, hand in March 4th  11th



March 4th

took up the GOPST assignment and discussed the terms
 
discussed Chpt 7 in class
v
http://vig.prenhall.com/catalog/academic/product/0,1144,0131866915,00.html handed out the beginning of Chpt 8 for discussion Mar 11
- (that deals with SOPs)
handed out copies of Chpt 9 for discussion Mar 11
students told to read Countermeasures: Deterrence and the section from Greene Chpt 8 that deals with  SOPs



March 10th
- online class
- stay home, read the material I gave you last week
 
http://vig.prenhall.com/catalog/academic/product/0,1144,0131866915,00.html make a summary of Chpt 8 / Chpt 9 for discussion Mar 18



March 18th
- discussed cryptography and viewed video on cryptography
 
handed out copies of pages in Chpt 8 re: firewalls for discussion next class
v
- handed out printed copies of "Identity Theft" online unit witiger.com/ecommerce/identitytheft.htm



March 25th
- discussed Internal Risks and Threats and Thiurd Party Risk and Outsourcing

Mini-Assignment # 5
for March 27th, hand in April 1st
- research and discuss a Canadian example (not on the BIT 801 website) of an Outsourcing Risk or Third Party Risk
Discuss:



for April 8th Assignment # 6

Katie will cover Contingency Planning
George - Cryptography etc.
Catherine - outsourcing
Urvi - privacy violations
Dave - ???

You will be expected to make a 10 minute presentation on the topic expanding on what already exists on the site, as well as adding in any updates or additional information as you see fit
The presentation will be digitally recorded and it it "good", it may be added to the site as a "student contribution"
- you are expected to come on time at 8:00 and contribute meaningfully to each other's presentations by paying attention and asking good questions



 
witiger.com
  CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE
.
  MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I
.
.