
Introduction to Cybersecurity and Strategy (2 Units C: LH 30)
Course Contents
Basic concepts: cyber, security, confidentiality, integrity, availability, authentication, access
control, non-repudiation and fault-tolerant methodologies for implementing security. Security policies, best current practices, testing security, and incident response, Risk management, disaster recovery and access control. Basic cryptography and software application vulnerabilities. Evolution of cyber-attacks. Operating system protection mechanisms, intrusion detection systems, basic formal models of security, cryptography, steganography, network and distributed system security, denial of service (and other) attack strategies, worms, viruses, transfer of funds/value across networks, electronic voting, secure applications. Cybersecurity policy and guidelines. Government regulation of information technology. Main actors of cyberspace and cyber operations. Impact of Cybersecurity on civil and military institutions, privacy, business and government applications; examination of the dimensions of networks, protocols, operating systems, and associated applications. Methods and motives of Cybersecurity incident perpetrators, and the countermeasures employed by organizations’ and agencies to prevent and detect those incidences. Ethical obligations of security professionals.
Trends and development in Cybersecurity. Software application vulnerabilities. Evolution of Cybersecurity and national security strategies, requirements to the typologies of cyber-attacks that require policy tools and domestic response. Cybersecurity strategies evolving in the face of big risk. Role of standards and frameworks.
- Teacher: LMS Admin