Due in my email by midnight Sunday (11/05)
Security Policy Paper
Write a document creating an
organization wide security policy (If you have no clue look at power
points for the first chapters or pages 18-22 in the book). The
paper should give me a real world example of a security policy,
security standards, and security guidelines for a real business.
I prefer one written for an orgainzation where you have worked.
However, if that is not possible the pick one you are familiar with,
for instance your parents' business or a University Business School.
Use of the vulnerabilities, risks,
threats, and and other pertinant information from our links would be a
good place to start.
Given that most of you have never
worked on this type of thing in the “real world” this paper is briefer
that the those which would be implemented. Work for applicable but
brief (maybe 5 or so pages) paper.
Due NO LATER THAN 12/6 but 12/3 would be MUCH better
|Instapaper --> twitter
||JohnRDurrett on Twitter||Instapaper-export|| DrJohn's rss links
DNS Reconnaissance using nmap
|Linux: 20 Iptables Examples For New SysAdmins||Cloud Computing on Resources Page||Intel Cloud Computing Security planning guide|| Cloud
to Wireshark (Part 1 of 3) 9:06
and Grabbing Passwords with Wireshark (Part 2 of 3) 5:11
Mining using Wireshark (Part 3 of 3) 6:03
Ultimate Wireshark Tutorial 49:27
tutorial,Top 5 features you must Know in 5 minutes 9:05
for Windows for Breaking WEP/WPA 12:40
The Ripper To Crack Passwords-BackTrack Tutorials For Beginners 2:50
YouTube Security Tools
WEP Key Hacking 5:44
History of Hacking 50:09
|MCS 10/9||MCS 10/11||MCS 10/16||MCS 10/18||MCS 10/23|
|MCS 10/25||MCS 10/30||MCS 11/1||MCS 11/6||MCS 11/8|
|MCS 11/13||MCS 11/15||MCS 11/27||MCS 11/29||MCS 12/4|
|2011 Spring||2012 Spring||2012 Fall||2013 Spring||2013
|2015 Spring||2011 Fall||2014 Fall||2010 Spring||2014 Spring|