Intro to Computer Security

EECS 398
Fall 2010

ITS Discussion Schedule

The schedule is subject to change. Please check this page periodically.

When available, slides will be posted after each discussion. Please note that some slide decks may be restricted to class participants.

In addition to attending the ITS discussion section, staff will be required to complete a RECON during the semester.

Tuesday ITS Discussion
Sept. 10 The Security Program
Intro to ITS discussion section, overview of Security Program (slides)
Review RECON training materials, RECON package, discuss potential RECON scope with SUL prior to RECON scoping discussion.
Sept. 14 UM Authentication
Cosign and Kerberos (slides), 2FA/MToken (slides)
Optional reading: Attacking Kerberos Deployments (white paper, slides)
Sept. 21 RECON Scoping Q&A/ Examples
Overview and real-world examples of RECON scoping process (slides)
Finalize RECON scope by October 12; prepare diagram to present to class on that date.
Sept. 28 Networking @ UM
UM network architecture, virtual firewall (slides)
References: InterMapper - See "Map List" for maps; UMnet maps are towards the bottom of the page
Oct. 5 IIA Services and Resources
Attack Recognition (slides), Monthly Vulnerability Scanning (slides)
Begin RECON questionnaire, due October 26.
Oct. 12 RECON Scope Presentations
RECON scope diagram due
Review RECON materials as needed in preparation for reporting discussion on October 26.
Oct. 19
No discussion due to SUMIT_10
Oct. 26 RECON Reporting (slides)
RECON questionnaire due
Nov. 2 Incident Response @ UM (slides)
Nov. 9 The Role of Education and Awareness (slides)
Importance of educating the community about risks; resources provided by IIA for use by units
Nov. 16 Revisiting 2FA/MToken
Nov. 23 Windows Security @ UM
UMROOT, AD, GPO, firewall policies, standard loads, endpoint protection
Nov. 30 RECON presentations/ Q&A - CSE 3941
Dec. 7 Topics in Policy/ Regulations
RECON package due