Erinevus lehekülje "ITX8062" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
 
(ei näidata 2 kasutaja 48 vahepealset redaktsiooni)
1. rida: 1. rida:
==Information Systems Mass Attacks and Defence (fall 2013) ==
+
== STATUS: REPLACED BY [https://courses.cs.ttu.ee/pages/ITC8050 ITC8050] AS OF 2015 ==
 +
More information in the coming days.
 +
 
 +
==Information Systems Mass Attacks and Defence (fall 2014) ==
  
 
Weeks 1-8 of the Fall Semester
 
Weeks 1-8 of the Fall Semester
5. rida: 8. rida:
 
Tuesdays  17:45-21:00
 
Tuesdays  17:45-21:00
  
Room ICT-A1 (new IT building at Akadeemia 15a, second floor)
+
Room ICT-A1 (IT building at Akadeemia 15a, second floor)
  
 
==Instructors==
 
==Instructors==
13. rida: 16. rida:
 
Jaan Priisalu, Director General, [http://www.ria.ee Estonian Information System's Authority]
 
Jaan Priisalu, Director General, [http://www.ria.ee Estonian Information System's Authority]
  
Practice led by Tiit Hallas
+
Practice led by Bernhards Blumbergs
  
  
 
Contact: rain dot ottis at ttu dot ee
 
Contact: rain dot ottis at ttu dot ee
 
  
 
==Schedule==
 
==Schedule==
  
 
<b> NB! Check the schedule for updates before each lesson. </b>
 
<b> NB! Check the schedule for updates before each lesson. </b>
 +
 +
Lead instructor for lecture/practice is marked in parenthesis.
  
  
 
====Lesson 1====
 
====Lesson 1====
03.09.2013
+
02.09.2014
  
Introduction (Priisalu, Hallas) [[https://docs.google.com/file/d/0B7yq33Gize8yUEtZTGFsZVJ2aXM/edit?usp=sharing Slides]]
+
Introduction (Ottis, Priisalu, Blumbergs)  
  
Research paper topic assignment (Priisalu, Hallas)
+
Research paper topic assignment and requirements (Ottis, Priisalu)
 +
 
 +
[https://drive.google.com/file/d/0B7yq33Gize8ydmoycmM3WVJlNjA/edit?usp=sharing Course introduction slides (pdf)], [http://prezi.com/blipw3dpjae3/estonian-information-system-authority/ Introduction of RIA (prezi)]
  
  
 
====Lesson 2====
 
====Lesson 2====
10.09.2013
+
09.09.2014
  
Review of research paper requirements (Ottis) [[https://docs.google.com/file/d/0B7yq33Gize8yX0hraGR2OEFkNXM/edit?usp=sharing Slides]]
+
'''Lecture: ''' Why is cyber security important? Critical information, dependencies, etc. (Priisalu)
  
'''Lecture:''' cyber conflict and espionage (Ottis) [[https://docs.google.com/file/d/0B7yq33Gize8yTUJzUGxoZndpWFk/edit?usp=sharing Slides]]
+
'''Practice''' (Blumbergs)
 
 
Topics covered: Estonia 2007 and Georgia 2008 cyber conflicts, StuxNet, PRISM, discussion.
 
 
 
'''Practice''' (Hallas)
 
  
 
Topics covered: overview of exercises, introduction of tabletop exercises in the context of this course, explaining the need for processes based on the real life examples.
 
Topics covered: overview of exercises, introduction of tabletop exercises in the context of this course, explaining the need for processes based on the real life examples.
  
 +
Presentation is accessible here: [http://prezi.com/ag0vhdrmx1_p/?utm_campaign=share&utm_medium=copy&rc=ex0share Table top exercise concepts (Prezi)]
  
 
====Lesson 3====
 
====Lesson 3====
17.09.2013
+
16.09.2014
  
'''Lecture:''' cyber crime and terrorism (Ottis, Priisalu) [[https://docs.google.com/file/d/0B7yq33Gize8yU0hYUDlvWGtheXM/edit?usp=sharing Slides]]
+
'''Lecture:''' Reviewing the most important concepts of cyber security. (Priisalu)
  
Topics covered: criminal attacks, experiences from the banking sector, attack methods, motives, cooperation.
 
  
'''Practice''' (Hallas)
+
'''Practice''' (Blumbergs)
  
 
Topics covered: Creating teams, assigning team roles, introducing scenarios and injects, playing the first game.
 
Topics covered: Creating teams, assigning team roles, introducing scenarios and injects, playing the first game.
 
  
 
====Lesson 4====
 
====Lesson 4====
24.09.2013
+
23.09.2014
 
 
'''Lecture:''' politically motivated attacks (Ottis) [[https://docs.google.com/file/d/0B7yq33Gize8yejdlckR6T1NIa0E/edit?usp=sharing Slides]]
 
  
Topics covered: hactivism, private hacking for political reasons, state sponsored cyber attacks, cyber espionage, methods, motives, countermeasures.
+
'''Lecture:''' Why cyber? Cyber conflict, espionage, terrorism, crime, etc. (Ottis) ([https://drive.google.com/file/d/0B7yq33Gize8yem42cWItdVo5cEk/edit?usp=sharing slides])
  
'''Practice''' (Hallas)
+
'''Practice''' (Blumbergs)
  
 
Topics covered: Analysing the last game, playing by scenarios and with injects
 
Topics covered: Analysing the last game, playing by scenarios and with injects
 
  
 
====Lesson 5====
 
====Lesson 5====
01.10.2013
+
30.09.2014
  
'''Lecture:''' cyber security planning (Priisalu)
+
'''Lecture:''' Cyber security planning (Ottis)  
  
Topics covered: cyber security planning.
+
Guest lecture by Tiia Sõmer ([https://drive.google.com/file/d/0B7yq33Gize8yV05UZmJ0TVNKM0k/edit?usp=sharing slides])
  
'''Practice''' (Hallas)
+
'''Practice''' (Blumbergs, Ottis)
  
 
Topics covered: Explaining “the final game”, discussing self-written scenarios.
 
Topics covered: Explaining “the final game”, discussing self-written scenarios.
 
  
 
====Lesson 6====
 
====Lesson 6====
08.10.2013
+
07.10.2014
 
 
'''Lecture:''' incident handling and CIIP (Priisalu)
 
  
Topics covered: CIIP overall, CIIP in Estonia, crisis management, CERT perspective, law enforcement perspective, incident handling process in Estonia.
+
'''Lecture:''' Cyber security as an adversarial game (Priisalu)
  
  
 
====Lesson 7====
 
====Lesson 7====
15.10.2013
+
14.10.2014
  
'''Practice''' (Hallas, Ottis, Priisalu)
+
'''Practice''' (Blumbergs, Ottis, Priisalu)
  
 
Tabletop exercise  
 
Tabletop exercise  
99. rida: 94. rida:
  
 
====Lesson 8====
 
====Lesson 8====
22.09.2013
+
21.10.2014
 +
 
 +
'''Lecture:''' Preview of advanced cyber security topics.  
  
Course summary and feedback (Ottis, Priisalu, Hallas)
+
Course summary and feedback (Ottis, Priisalu, Blumbergs)
  
 
==Grade assignment==
 
==Grade assignment==
143. rida: 140. rida:
  
 
====Lesson 5====
 
====Lesson 5====
Discussing self-written scenarios and injects
+
Tabletop practice.
  
Explaining the "final game" and the methods
+
====Lesson 6====
 +
Discussing roles for the "final game".
  
 
====Lesson 7====
 
====Lesson 7====
155. rida: 153. rida:
 
===General information===
 
===General information===
 
Red teams will get to do less during the class exercises. However - their performance during the last exercise will be watched and graded with more detail. It requires much more independent work from the team to prepare.
 
Red teams will get to do less during the class exercises. However - their performance during the last exercise will be watched and graded with more detail. It requires much more independent work from the team to prepare.
 
If you have questions, comments or ideas about the topic then you can contact me via e-mail hallas at ut dot ee.
 
 
  
 
==EXAM==
 
==EXAM==
168. rida: 163. rida:
 
  - Be present at the beginning of the exam.
 
  - Be present at the beginning of the exam.
 
  - If you do not see your initials behind the correct date (after a few days) please contact the instructor again.
 
  - If you do not see your initials behind the correct date (after a few days) please contact the instructor again.
 +
- Last minute requests to change exam dates will be accepted only if the new date has slots available. However, last minute changes may generate a "late fee" in the grading of the paper (if the paper was not ready one week before the original exam).
 +
 +
* All exams take place in ICT-411 and there are 12 slots per exam time.
 +
* 15.12.2014 1800-2100 (closed):  KR, KT, AlR, JW, VP, ZA, GL, RA
 +
* 18.12.2014 1800-2100 (closed):  MK, KR, DP, LP, VC
 +
* 05.01.2015 1800-2100 (closed):  CW, OS, RS, VA, TS, AV, AkR, NK, NG, AT, AZ, TP
 +
* 07.01.2015 1800-2100 (closed):  OD, TH, ZW, CZ, FS, MZ, ZA, VP, RB, VP, MS, DM
 +
* 12.01.2015 1800-2100 (closed):  RA, IA, EI, KV, PV, DI, ES, PM, SE, KKu, MJ, UL
 +
* 13.01.2015 1800-2100 (closed):  TM, RK, SS, EC, MA, MK, JG, KKa, PA, MF, AE, MA
 +
 +
Due to the fact that the first two exam dates were underutilized, a reserve exam date is now available for people who have not yet registered. This is only meant for students who have not yet registered for an earlier exam!
  
As of 30.12.2013:
+
  * 22.01.2015 1800-2100 CT, LD, EA
  - 18.12.2013 1800 at ICT411 (registration closed)(Registered: LX, IT, CH, MA, AJ, KK, XL, EI)
 
- 07.01.2014 1800 at ICT411 (registration closed)(Registered: RZ, OA, IK, AR, AP)
 
- 09.01.2014 1800 at ICT411 (registration closed)(Registered: TM, AS, KL, VT, AS, TS, PU, MK, CM)
 
  - 20.01.2014 1800 at ICT411 (registration closed)(Registered: YY, CR, SM, TT, PK, VT, LD, SS, KK, TL, ArK, AtK)
 
  
 
</b>
 
</b>
  
Admin notes
+
=== Admin notes ===
 
  - This is an oral exam.
 
  - This is an oral exam.
 
  - You are allowed to use your computer/notes during the preparation.
 
  - You are allowed to use your computer/notes during the preparation.

Viimane redaktsioon: 31. august 2015, kell 13:35

STATUS: REPLACED BY ITC8050 AS OF 2015

More information in the coming days.

Information Systems Mass Attacks and Defence (fall 2014)

Weeks 1-8 of the Fall Semester

Tuesdays 17:45-21:00

Room ICT-A1 (IT building at Akadeemia 15a, second floor)

Instructors

Rain Ottis, PhD, Associate Professor at TUT

Jaan Priisalu, Director General, Estonian Information System's Authority

Practice led by Bernhards Blumbergs


Contact: rain dot ottis at ttu dot ee

Schedule

NB! Check the schedule for updates before each lesson.

Lead instructor for lecture/practice is marked in parenthesis.


Lesson 1

02.09.2014

Introduction (Ottis, Priisalu, Blumbergs)

Research paper topic assignment and requirements (Ottis, Priisalu)

Course introduction slides (pdf), Introduction of RIA (prezi)


Lesson 2

09.09.2014

Lecture: Why is cyber security important? Critical information, dependencies, etc. (Priisalu)

Practice (Blumbergs)

Topics covered: overview of exercises, introduction of tabletop exercises in the context of this course, explaining the need for processes based on the real life examples.

Presentation is accessible here: Table top exercise concepts (Prezi)

Lesson 3

16.09.2014

Lecture: Reviewing the most important concepts of cyber security. (Priisalu)


Practice (Blumbergs)

Topics covered: Creating teams, assigning team roles, introducing scenarios and injects, playing the first game.

Lesson 4

23.09.2014

Lecture: Why cyber? Cyber conflict, espionage, terrorism, crime, etc. (Ottis) (slides)

Practice (Blumbergs)

Topics covered: Analysing the last game, playing by scenarios and with injects

Lesson 5

30.09.2014

Lecture: Cyber security planning (Ottis)

Guest lecture by Tiia Sõmer (slides)

Practice (Blumbergs, Ottis)

Topics covered: Explaining “the final game”, discussing self-written scenarios.

Lesson 6

07.10.2014

Lecture: Cyber security as an adversarial game (Priisalu)


Lesson 7

14.10.2014

Practice (Blumbergs, Ottis, Priisalu)

Tabletop exercise


Lesson 8

21.10.2014

Lecture: Preview of advanced cyber security topics.

Course summary and feedback (Ottis, Priisalu, Blumbergs)

Grade assignment

30% - Performance at the tabletop exercises

30% - Written assignment (research paper, 2000-4000 words)

40% - Oral exam


Tabletop Exercise (practice component)

It's game time! In this part of the course we will learn about war games. We will discuss their importance and practical applications in the real world and see how those games are organized. We will not only talk about them, but we will try them out as well.

The goal of this is to analyse the importance of communication processes and to understand the need to test those processes using tabletop exercises. We will create different teams with different tasks that will fall into two main categories: Red teams and Blue teams.

To the blue teams we will show that you might not have the full understanding of the situation, not enough information and resources.

To the red teams we will show that even though you might have a perfect plan, things will not go as you would want them to go.

Agenda

Lesson 2

Introduction

Processes and testing

Examples of different exercises and games from real life

Lesson 3

Creating teams, assigning roles

Introducing scenarios and injects

Playing the first game to understand what we are doing

Lesson 4

Playing the first game with scenarios and injects

Analysing the game and reports

Lesson 5

Tabletop practice.

Lesson 6

Discussing roles for the "final game".

Lesson 7

Final game

Lesson 8

Feedback

General information

Red teams will get to do less during the class exercises. However - their performance during the last exercise will be watched and graded with more detail. It requires much more independent work from the team to prepare.

EXAM

Exam times

- Note that there are limited exam slots available for each date, so register (via e-mail to dr Ottis) as soon as possible.
- Send in your paper at least one week before the exam date.
- Be present at the beginning of the exam.
- If you do not see your initials behind the correct date (after a few days) please contact the instructor again.
- Last minute requests to change exam dates will be accepted only if the new date has slots available. However, last minute changes may generate a "late fee" in the grading of the paper (if the paper was not ready one week before the original exam).
* All exams take place in ICT-411 and there are 12 slots per exam time.
* 15.12.2014 1800-2100 (closed):   KR, KT, AlR, JW, VP, ZA, GL, RA
* 18.12.2014 1800-2100 (closed):   MK, KR, DP, LP, VC
* 05.01.2015 1800-2100 (closed):   CW, OS, RS, VA, TS, AV, AkR, NK, NG, AT, AZ, TP
* 07.01.2015 1800-2100 (closed):   OD, TH, ZW, CZ, FS, MZ, ZA, VP, RB, VP, MS, DM
* 12.01.2015 1800-2100 (closed):   RA, IA, EI, KV, PV, DI, ES, PM, SE, KKu, MJ, UL
* 13.01.2015 1800-2100 (closed):   TM, RK, SS, EC, MA, MK, JG, KKa, PA, MF, AE, MA

Due to the fact that the first two exam dates were underutilized, a reserve exam date is now available for people who have not yet registered. This is only meant for students who have not yet registered for an earlier exam!

* 22.01.2015 1800-2100 :  CT, LD, EA

Admin notes

- This is an oral exam.
- You are allowed to use your computer/notes during the preparation.
- At the beginning of the exam, each student will get two questions (may contain sub-questions). 
- At least one of the questions will be related to the individual paper topic or the paper itself.
- Students will have time to prepare their answers.