<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="et">
	<id>http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kaur</id>
	<title>Kursused - Kasutaja kaastöö [et]</title>
	<link rel="self" type="application/atom+xml" href="http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kaur"/>
	<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/pages/Eri:Kaast%C3%B6%C3%B6/Kaur"/>
	<updated>2026-05-21T18:58:36Z</updated>
	<subtitle>Kasutaja kaastöö</subtitle>
	<generator>MediaWiki 1.35.9</generator>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITC8111&amp;diff=3862</id>
		<title>ITC8111</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITC8111&amp;diff=3862"/>
		<updated>2016-02-02T10:39:51Z</updated>

		<summary type="html">&lt;p&gt;Kaur: /* Special Course in Cyber Security I: Locked Shields 2016 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Special Course in Cyber Security I: Locked Shields 2016 =&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Instructor:&amp;#039;&amp;#039;&amp;#039; Kaur Kasak, kaur.kasak [ at ] gmail.com&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Topic:&amp;#039;&amp;#039;&amp;#039; Exercise Locked Shields 2016. Student&amp;#039;s role: Test Run Blue Team, Execution White Team support&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Objectives:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** Provide the students a practical experience in &amp;#039;&amp;#039;&amp;#039;assembling a defensive team and preparing a defensive campaign&amp;#039;&amp;#039;&amp;#039; according to exercise scenario. This will be accomplished by engaging the students into the Blue Teams of LS16 Test Run.&lt;br /&gt;
** Provide the students an experience in &amp;#039;&amp;#039;&amp;#039;responding to full-scale cyber attack campaign&amp;#039;&amp;#039;&amp;#039; by tasking them to protect exercise networks during one day lasting attack campaign.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Use the help of the students to run LS16&amp;#039;&amp;#039;&amp;#039;. Provide the students insight how technical cyber defence exercises are organized. The students will be engaged into the White Team after the Test Run. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Limitations&amp;#039;&amp;#039;&amp;#039;: &lt;br /&gt;
** 3 Student Blue Teams, (up to) 12 + 12 + 12 students&lt;br /&gt;
** LS16 will be UNCLASS exercise, but &amp;#039;&amp;#039;&amp;#039;participation is only open to persons who have nationality of a NATO nation&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Important Dates&amp;#039;&amp;#039;&amp;#039;:&lt;br /&gt;
&lt;br /&gt;
** 10 Feb 2016 18:00 - 20:30, Room U06-220, Kick-off meeting&lt;br /&gt;
** (Tentative) 22 Feb 2016 18:00 - 20:30, Room U06-220, Team progress review meeting&lt;br /&gt;
** 01 Feb - 08 Mar 2016: Intensive preparation period&lt;br /&gt;
** 09-10 Mar 2016: Access to systems. Test Run (full-day events!)&lt;br /&gt;
** 19-21 Apr 2016: Execution (full-day events!) &lt;br /&gt;
* All other information will be provided through another collaboration environment. In case you have registered but have not received the invitation by &amp;#039;&amp;#039;&amp;#039;12 Feb 2016&amp;#039;&amp;#039;&amp;#039;, please contact kaur.kasak [ at ] gmail.com&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3828</id>
		<title>ITX8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3828"/>
		<updated>2016-01-30T18:44:28Z</updated>

		<summary type="html">&lt;p&gt;Kaur: /* LOCKED SHIELDS 2016 version */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= LOCKED SHIELDS 2016 version =&lt;br /&gt;
This course has a new code - [[ITC8111]]&lt;br /&gt;
&lt;br /&gt;
= STRATEGY / CYBER CHALLENGE PREP version =&lt;br /&gt;
&lt;br /&gt;
* Instructor: Tiia Sõmer&lt;br /&gt;
* Topic: management of cyber security at a strategic level. The course will be taught by invited speakers (from Estonia and international), putting main effort to the practical side of strategic cyber security. The course is also designed to prepare students for the 9/12 Cyber Challenge, but participation does not guarantee a slot on the TUT team.&lt;br /&gt;
* First meeting: &amp;#039;&amp;#039;&amp;#039;05 Nov 2015&amp;#039;&amp;#039;&amp;#039; at &amp;#039;&amp;#039;&amp;#039;1800-1930&amp;#039;&amp;#039;&amp;#039; in &amp;#039;&amp;#039;&amp;#039;ICT-315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
== Schedule ==&lt;br /&gt;
NB! Check for updates regularly!&lt;br /&gt;
&lt;br /&gt;
=== 05.11 ===&lt;br /&gt;
Introduction to the course (Tiia Sõmer) [[Meedia:001_05NOV15.pptx]]&lt;br /&gt;
&lt;br /&gt;
Strategic issues in cyber security (Rain Ottis)&lt;br /&gt;
&lt;br /&gt;
Cyber Challenge 2015 experience (Wael AbuSeada)&lt;br /&gt;
&lt;br /&gt;
=== 12.11 ===&lt;br /&gt;
&lt;br /&gt;
International actors in cyberspace, role of small states in international arena (Liina Areng) [[Meedia:002_12NOV15_LA.pdf]]&lt;br /&gt;
&lt;br /&gt;
E-Diplomacy (Tanel Sepp)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;#039;&amp;#039;&amp;#039;19.11 -&amp;gt; 20.11&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;PLEASE NOTE THE CHANGE OF DATE TO 20NOV 2015 !!!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;THE LECTURE WILL BE HELD IN THE SAME ROOM AS USUALLY: ICT 315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
UN and Cyber Security (Peter Pedak) [[Meedia:003_20NOV15_PP.pdf]]&lt;br /&gt;
&lt;br /&gt;
EU and cyber security. EU Cyber Security Structure. The functioning of EU (Luukas Ilves)&lt;br /&gt;
&lt;br /&gt;
NATO and Cyber Security (Hannes Krause) [[Meedia:004_20NOV15_HK.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== 26.11 -&amp;gt; 27.11 ===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;PLEASE NOTE THE CHANGE OF DATE TO 27 NOV 2015 !!!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;THE LECTURE WILL BE HELD IN THE SAME ROOM AS USUALLY: ICT 315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Comparative analysis of cyber security strategies (Kadri Kaska)[[Meedia:005_27NOV15_KK.pdf]]&lt;br /&gt;
&lt;br /&gt;
General principles of International law applicable in cyberspace (Pascale Brangetto)[[Meedia:006_27NOV15_PB.pdf]]&lt;br /&gt;
&lt;br /&gt;
Writing policy briefs (Dr Mika Kerttunen)&lt;br /&gt;
&lt;br /&gt;
=== 03.12 -&amp;gt; 07.12 ===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;DATE HAS BEEN CHANGED TO 07 DECEMBER&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Cyber security and national security. Decision-making on cyber at national level. (Kristjan Prikk) [[Meedia:009_07DEC15_KP.pdf]]&lt;br /&gt;
&lt;br /&gt;
Critical Infrastructure and Critical Information Infrastructure (Urmo Sutermäe) [[Meedia:008_07DEC15_US.pdf]]&lt;br /&gt;
&lt;br /&gt;
Crisis Management in Cyber (Lauri Luht) [[Meedia:007_07DEC15_LL.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== 10.12 ===&lt;br /&gt;
Media involvement/ strategic communications in cyber crisis (Liisa Past)&lt;br /&gt;
&lt;br /&gt;
Strategic communications is a somewhat underrated aspect in crisis management. This lecture will give you insight into how STRATCOM can be used to your advantage in times of crisis. The lecture will take place in the form of seminar, please come with your questions and thoughts and be ready to discuss the topic.&lt;br /&gt;
&lt;br /&gt;
=== WRITTEN ASSIGNMENT ====&lt;br /&gt;
&lt;br /&gt;
This assignment can be completed either individually or as teamwork. In individual task, you will have to provide one policy recommendation; in case you opt for teamwork you should provide policy recommendations from one perspective per person in the group. The maximum group size can be 4 persons.&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Deadline for submission of written assignment is 10 January 2016&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;INSTRUCTIONS&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
You are cyber security advisor to the Government of one country. A major cyber incident is occurring that affects the country’s national security. The Head of Government needs information on the full range of ongoing crisis and policy response alternatives available to respond, and you have been tasked to develop policy recommendation to the Government. You should provide policy recommendation from one of the following perspectives:&lt;br /&gt;
&lt;br /&gt;
-	Crisis management at national level;&lt;br /&gt;
&lt;br /&gt;
-	Critical infrastructure;&lt;br /&gt;
&lt;br /&gt;
-	Private sector; &lt;br /&gt;
&lt;br /&gt;
-	Diplomacy/ international organisations;&lt;br /&gt;
&lt;br /&gt;
-	Legal;&lt;br /&gt;
&lt;br /&gt;
-	Cyber security. &lt;br /&gt;
&lt;br /&gt;
To present your policy recommendation, you will have to keep in mind all aspects in order to successfully synthesize useful policy measures from the limited information available. &lt;br /&gt;
&lt;br /&gt;
You will be provided with fictional information on the background and current situation of a major cyber attack. The scenario will present a fictional account of political and economic developments leading up to the cyber incident. You are restricted to the facts provided within the coming week in order to formulate your analysis. &lt;br /&gt;
You will have to &amp;#039;&amp;#039;&amp;#039;provide a WRITTEN POLICY PAPER of 1500 words&amp;#039;&amp;#039;&amp;#039;. This will be an analytical paper, discussing the potential implications of the cyber attack for different state and non-state actors and exploring one policy recommendation from selected perspective as chosen in depth. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Some tips:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
-	Don’t fight the scenario – assume the information given is true, and explore the implications of that information, not plausibility of scenario.&lt;br /&gt;
&lt;br /&gt;
-	Be creative – cyber policy is an evolving discourse and there is no single correct policy response to any scenario. There can be many ideas to experiment with in responding to crisis. &lt;br /&gt;
&lt;br /&gt;
-	Analyse the issues – it will be more important to analyse the issues than to list all possible problems or solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Information on background and current situation&amp;#039;&amp;#039;&amp;#039; of cyber attack affecting the country:&lt;br /&gt;
&lt;br /&gt;
The country in question is the U.S. and you are asked to give advise to the Cybersecurity Directorate of the National Security Staff. The packet attached herewith contains fictional information on the background and current situation of a major cyber attack affecting the United States. The scenario added represents fictional account of political and economic developments leading to the cyber incident. You are restricted to the facts contained in the attached documents in formulating your answers. &lt;br /&gt;
&lt;br /&gt;
Your recommendation must analyse the possible strengths, weaknesses, opportunities and threats of the proposed policy alternative. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Scenario packet:&amp;#039;&amp;#039;&amp;#039; [[Meedia:strat_course_written_assignment_2015.pdf]]&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITC8111&amp;diff=3827</id>
		<title>ITC8111</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITC8111&amp;diff=3827"/>
		<updated>2016-01-30T18:43:54Z</updated>

		<summary type="html">&lt;p&gt;Kaur: Uus lehekülg: &amp;#039;= Special Course in Cyber Security I: Locked Shields 2016 =  * &amp;#039;&amp;#039;&amp;#039;Instructor:&amp;#039;&amp;#039;&amp;#039; Kaur Kasak, kaur.kasak [ at ] gmail.com  * &amp;#039;&amp;#039;&amp;#039;Topic:&amp;#039;&amp;#039;&amp;#039; Exercise Locked Shields 2016. Student&amp;#039;s r...&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Special Course in Cyber Security I: Locked Shields 2016 =&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Instructor:&amp;#039;&amp;#039;&amp;#039; Kaur Kasak, kaur.kasak [ at ] gmail.com&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Topic:&amp;#039;&amp;#039;&amp;#039; Exercise Locked Shields 2016. Student&amp;#039;s role: Test Run Blue Team, Execution White Team support&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Objectives:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** Provide the students a practical experience in &amp;#039;&amp;#039;&amp;#039;assembling a defensive team and preparing a defensive campaign&amp;#039;&amp;#039;&amp;#039; according to exercise scenario. This will be accomplished by engaging the students into the Blue Teams of LS16 Test Run.&lt;br /&gt;
** Provide the students an experience in &amp;#039;&amp;#039;&amp;#039;responding to full-scale cyber attack campaign&amp;#039;&amp;#039;&amp;#039; by tasking them to protect exercise networks during one day lasting attack campaign.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Use the help of the students to run LS16&amp;#039;&amp;#039;&amp;#039;. Provide the students insight how technical cyber defence exercises are organized. The students will be engaged into the White Team after the Test Run. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Limitations&amp;#039;&amp;#039;&amp;#039;: &lt;br /&gt;
** 3 Student Blue Teams, (up to) 12 + 12 + 12 students&lt;br /&gt;
** LS16 will be UNCLASS exercise, but &amp;#039;&amp;#039;&amp;#039;participation is only open to persons who have nationality of a NATO nation&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Important Dates&amp;#039;&amp;#039;&amp;#039;:&lt;br /&gt;
&lt;br /&gt;
** First meeting: TBD Feb 2016&lt;br /&gt;
** 01 Feb - 08 Mar 2016: Intensive preparation period&lt;br /&gt;
** 09-10 Mar 2016: Access to systems. Test Run (full-day events!)&lt;br /&gt;
** 19-21 Apr 2016: Execution (full-day events!) &lt;br /&gt;
* All other information will be provided through another collaboration environment. In case you have registered but have not received the invitation by &amp;#039;&amp;#039;&amp;#039;12 Feb 2016&amp;#039;&amp;#039;&amp;#039;, please contact kaur.kasak [ at ] gmail.com&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber&amp;diff=3826</id>
		<title>Cyber</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber&amp;diff=3826"/>
		<updated>2016-01-30T18:41:23Z</updated>

		<summary type="html">&lt;p&gt;Kaur: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News for Spring 2016 ==&lt;br /&gt;
Rearranged by course code&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June thesis defence&amp;#039;&amp;#039;&amp;#039; candidates - please indicate your thesis topic by 01 FEB in Moodle. See the [https://courses.cs.ttu.ee/pages/Thesis Thesis] page for more details.  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IDN0110 Data Mining and Network Analysis&amp;#039;&amp;#039;&amp;#039; will be offered this semester. Lectures on Mondays 1745-1915, practice on Tuesdays 1400-1530. Location TBA. Instructor: dr Sven Nõmm. [https://courses.cs.ttu.ee/pages/Data_Mining_and_network_analysis_IDN0110 Details]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8010 Legal Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered this semester. Instructor: Anna-Maria Osula. Fridays 1200-1530 in room ICT-315. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8050 Strategic and Operational Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered this semester. Even week Wednesdays 1745-2100 in ICT-315. [https://courses.cs.ttu.ee/pages/ITC8050 Details]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[https://courses.cs.ttu.ee/pages/ITC8060 ITC8061 Network Protocol Design]&amp;#039;&amp;#039;&amp;#039; replaces ITC8060 (instructor: prof Olaf Maennel). ITC8061 will be &amp;#039;&amp;#039;&amp;#039;6 ECTS&amp;#039;&amp;#039;&amp;#039; (elective in Special Studies module, both specializations).&lt;br /&gt;
* [[ITC8111]] Special Course&amp;#039;&amp;#039;&amp;#039; on &amp;#039;&amp;#039;&amp;#039;Locked Shields&amp;#039;&amp;#039;&amp;#039; will take place. This will be available for both specializations. Instructor: Kaur Kasak.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8112 Special Course&amp;#039;&amp;#039;&amp;#039; on &amp;#039;&amp;#039;&amp;#039;current cyber security topics&amp;#039;&amp;#039;&amp;#039; will take place in ICT-312 on odd week Wednesdays 1745-2015. This will be available for both specializations. Instructor: dr Hayretdin Bahsi. [https://courses.cs.ttu.ee/pages/ITC8112 Details]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;MTAT.03.248 Introduction to Internet Psychology&amp;#039;&amp;#039;&amp;#039; (instructor: Kätlin Konstabel) will take place &amp;#039;&amp;#039;&amp;#039;in Tallinn&amp;#039;&amp;#039;&amp;#039; during first half of the semester, on Mondays 1200-1600 and Tuesdays 1000-1400 on the dates of 15-16 FEB, 29 FEB - 01 MAR, 14-15 MAR, 28-29 MAR - total of 8 lectures. Room ICT-315. Sign up via Tartu University OIS (admin problems -&amp;gt; hanna-liisa.ennet@ut.ee). &amp;#039;&amp;#039;&amp;#039;NB! First lecture now on 15 FEB.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;MTAT.03.307 Secure Software Design&amp;#039;&amp;#039;&amp;#039; will be available with a &amp;#039;&amp;#039;&amp;#039;mostly remote study&amp;#039;&amp;#039;&amp;#039; option  (minimal travel needed) this semester. The first lecture in Tartu on 18 FEB is mandatory.  Sign up via Tartu University OIS (admin problems -&amp;gt; hanna-liisa.ennet@ut.ee). [https://courses.cs.ut.ee/2016/ssd/spring Details]&lt;br /&gt;
* It is highly recommended that &amp;#039;&amp;#039;&amp;#039;Digital Forensics students&amp;#039;&amp;#039;&amp;#039; take at least one course from Tartu University (see the previous two bullets for possible candidates that require little or no travel). &lt;br /&gt;
* General note: you can replace &amp;#039;&amp;#039;&amp;#039;Intro to IT&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Intro to Programming&amp;#039;&amp;#039;&amp;#039; with more advanced IT courses that have at least the same ECTS. Consult with Rain Ottis before committing to any changes, though. &lt;br /&gt;
* General note: if you take more ECTS than required in the Special Studies module than this will count towards your Free Choice module. It is not necessary to actually move the courses to Free Studies in this case.&lt;br /&gt;
* General note: contact Rain Ottis if you need to move HOE7023, ITC8010, ITC8050 or ITC8070 to the correct module (it may show up under Free Choice).&lt;br /&gt;
&lt;br /&gt;
== News for Fall 2015 ==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January thesis defence dates:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
** 14 DEC - deadline for applying for defence in OIS (thesis code ITC70LT). &lt;br /&gt;
** 05 JAN - deadline for submitting your thesis for review. &lt;br /&gt;
** 18 JAN - thesis defence day.&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
* The new instructor for &amp;#039;&amp;#039;&amp;#039;ITX8090&amp;#039;&amp;#039;&amp;#039; (Information and Cyber Security Assurance in Organisations) is Dr Andro Kull.&lt;br /&gt;
&lt;br /&gt;
* If a course does not show up on your schedule: &lt;br /&gt;
** try a manual search for that specific course. Electives (especially from different departments) are often not added to the full schedule.&lt;br /&gt;
** wait. Some of them are not in the system yet, but this should be resolved by the end of this week.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8041&amp;#039;&amp;#039;&amp;#039; (Legal Aspects of Cyber Security) is replaced by &amp;#039;&amp;#039;&amp;#039;ITC8010&amp;#039;&amp;#039;&amp;#039; (same name). There are minor changes in content and the course is now given on both semesters. For the fall semester of 2015 the course is given by Agnes Käsper. Do not take it, if you have already passed ITX8041. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8215&amp;#039;&amp;#039;&amp;#039; (Digital Evidence) is replaced by &amp;#039;&amp;#039;&amp;#039;HOE7023&amp;#039;&amp;#039;&amp;#039; (same name); taught by Agnes Käsper. There are no significant changes to the content. Do not take it, if you have already passed ITX8215. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place every week for weeks 1-8 in U03-222 on Mondays at 1745-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8062&amp;#039;&amp;#039;&amp;#039; (Information Systems Mass Attacks and Defence) is replaced by &amp;#039;&amp;#039;&amp;#039;ITC8050&amp;#039;&amp;#039;&amp;#039; (Strategic and Operational Aspects of Cyber Security), which will be offered on both semesters. The course will be given on odd weeks throughout the semester (previously taught on weeks 1-8). The course is designed for second year students and there are limited number of seats available. If you do not fit into this fall&amp;#039;s version, you can take it in the spring. Do not take it, if you have already passed ITX8062. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place on odd weeks throughout the semester in ICT-A1 on Wednesday 1745-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8063&amp;#039;&amp;#039;&amp;#039; (Information Systems Hacking Attacks and Defence) is replaced by &amp;#039;&amp;#039;&amp;#039;ITC8070&amp;#039;&amp;#039;&amp;#039; (Information Systems Attacks and Defence). The new course will be 4 ECTS and there are limited slots available. Do not take it, if you have already passed ITX8063. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place every week on weeks 9-16 in SOC-212 on Tuesday 1745-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* If you enrolled in 2014 or earlier, then the replacement courses (see above) may not display in the correct modules. Do not worry about this, we will move them at the end of the semester. Just contact Rain Ottis during the exam session and let him know what the situation is.&lt;br /&gt;
&lt;br /&gt;
* A special course on forensics takes place (&amp;#039;&amp;#039;&amp;#039;ITX8220/ITX8221&amp;#039;&amp;#039;&amp;#039; - you should pick a code that you have not used yet) in the second half of the semester. This will be a hands on course that is going to look at the forensics tools in Kali Linux. It is taught by Erika Matsak. If you consider taking it, you will have to sign up for it by September 10th. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place every week on weeks 9-16 in ICT-403 on Monday 1930-2100 and Thursday 1930-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* The seminars [https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;] (depending on your focus) are taking place together on Tuesdays, 1600-1730 in room ICT-315. They are designed to help you with your thesis and should be taken on the third semester. However, you can also take it during your first semester, if you already have some idea about your thesis. You can only sign up for one seminar. If you have passed either one in the past, then you can attend, but not get credit for it. &lt;br /&gt;
&lt;br /&gt;
* There will be a Special Course on Cyber Security ([https://courses.cs.ttu.ee/pages/ITX8050 &amp;#039;&amp;#039;&amp;#039;ITX8050&amp;#039;&amp;#039;&amp;#039;]) that focuses on national and international cyber security questions (policy/strategy level). The course is designed to prepare candidates for the Cyber Challenge, although there is no guarantee that those who pass the course actually get to go. Last year we sent a team to Switzerland and they did very well. This course will be run by Tiia Sõmer during the second half of the semester, on Thursday evenings at 1800-1930 in ICT-315.  &lt;br /&gt;
&lt;br /&gt;
* Information about &amp;#039;&amp;#039;&amp;#039;language courses&amp;#039;&amp;#039;&amp;#039; in [http://www.ttu.ee/faculty-of-social-sciences/language-centre-2/student-guidelines-2/ English] and in [http://www.ttu.ee/?id=14217 Estonian].&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IDN0110&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8080&amp;#039;&amp;#039;&amp;#039; are not offered this semester.&lt;br /&gt;
&lt;br /&gt;
== News for Spring 2016 ==&lt;br /&gt;
&lt;br /&gt;
* There will be a 6 credit point data mining course for 15-20 people offered by Sven Nõmm (in Tallinn). More details in January.&lt;br /&gt;
&lt;br /&gt;
* Tartu University courses &amp;#039;&amp;#039;&amp;#039;MTAT.03.246&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;MTAT.03.247&amp;#039;&amp;#039;&amp;#039; will be combined into one 6 ECTS course &amp;#039;&amp;#039;&amp;#039;MTAT.03.307&amp;#039;&amp;#039;&amp;#039; (Principles of Secure Software Design). &lt;br /&gt;
&lt;br /&gt;
* Tartu University Research Seminar on Cryptography (MTAT.07.019) gets a new code: &amp;#039;&amp;#039;&amp;#039;MTAT.07.022&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
== Studies ==&lt;br /&gt;
&lt;br /&gt;
==== Administrative information ====&lt;br /&gt;
&lt;br /&gt;
[http://www.ttu.ee/students/study-information-2/academic-calendar-9/ Academic Calendar] in English &lt;br /&gt;
&lt;br /&gt;
[http://www.ttu.ee/public/t/tudengile/oppeinfo/juhendid/Akad_kalender_15_16.pdf Academic Calendar] in Estonian (pdf)&lt;br /&gt;
&lt;br /&gt;
[https://ois.ttu.ee/ Study portal]. See also:&lt;br /&gt;
&lt;br /&gt;
* [https://ois.ttu.ee/video/english portal intro video]&lt;br /&gt;
&lt;br /&gt;
* Navigate to the Cyber Security curriculum: click ENG on the right, Select Curricula on the left, Select by &amp;quot;structural units&amp;quot; under Curricula, Open (click to the little +) &amp;quot;Faculty of Information Technology&amp;quot;,  &amp;quot;10. IVCM09 	IVCM09/13 	Cybersecurity&amp;quot; in the middle table &lt;br /&gt;
&lt;br /&gt;
* You must declare your courses for the semester by the so-called &amp;quot;red line&amp;quot; date, which is generally mid-September or mid-February, depending on the semester. Use the [http://ois.ttu.ee/pls/portal/ois2.ois_public.main OIS study portal] to declare courses. &lt;br /&gt;
&lt;br /&gt;
* Please contact Dean&amp;#039;s office for necessary passwords if you cannot log in with your ID-card and for any other kind of technical administrative help!&lt;br /&gt;
&lt;br /&gt;
==== Course web sites ====&lt;br /&gt;
&lt;br /&gt;
Please note that this is not a complete list.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8050&amp;#039;&amp;#039;&amp;#039; [[ITC8050 | Strategic and Operational Aspects of Cyber Security]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITV8060&amp;#039;&amp;#039;&amp;#039; Computer Network Security (4 ECP) is available and free on Fall for second year students and can be moved to Specialization module after you have got a grade.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; [http://courses.cs.ttu.ee/pages/ITX8040 Cyber Defence seminar] &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8042&amp;#039;&amp;#039;&amp;#039; [[Malware:ITX8042:2014 | 2014 Malware]] &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8050&amp;#039;&amp;#039;&amp;#039; [[ITX8050 | Special Course in Cyber Security]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8060&amp;#039;&amp;#039;&amp;#039; [[Malware:ITX8042:2014 | 2014 Malware II]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8062&amp;#039;&amp;#039;&amp;#039; [[ITX8062 | Information Systems Mass Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8063&amp;#039;&amp;#039;&amp;#039; [[ITX8063 | Information Systems Hacking Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8071&amp;#039;&amp;#039;&amp;#039; Cyber Defense Monitoring Solutions replaces the course ITX8070 Log Mining and Disc Forensics. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8090&amp;#039;&amp;#039;&amp;#039; [[ITX8090 | Information and Cyber Security Assurance in Organisations]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8220/ITX8221&amp;#039;&amp;#039;&amp;#039; [[ITX8220 | Special Course in Digital Forensics]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[ITC8060]]&amp;#039;&amp;#039;&amp;#039; [[ITC8060|Network Protocol Design.]]&lt;br /&gt;
&lt;br /&gt;
The courses are free (the invoices are cancelled) to Cyber Security RE students and can be moved to Specialization module after you get a grade.&lt;br /&gt;
&lt;br /&gt;
==== Sources for free choice courses ====&lt;br /&gt;
&lt;br /&gt;
You can look for additional free choice courses from the following sources&lt;br /&gt;
&lt;br /&gt;
Scan the [http://ois.ttu.ee OIS study portal] for available courses this semester (takes effort, but it is useful to learn to find your way in OIS). You can find all the courses given in English (timetables of all international programs) in TUT by looking at OIS -&amp;gt; Timetables -&amp;gt; click to GB flag in the center of the page.&lt;br /&gt;
&lt;br /&gt;
You can take [http://www.ttu.ee/faculty-of-social-sciences/language-centre-2/student-guidelines-2/ some other language course] (French, German, Russian, Finnish) offered by the [http://www.ttu.ee/faculty-of-social-sciences/language-centre-2/ Language Centre] in addition to the courses (HLI2200, HLX8040) in your curriculum. Some of the alternative courses may not be free to study. In such a case OIS will give notice when you declare the course.&lt;br /&gt;
&lt;br /&gt;
==== ITX8512 Practical Training in Information Technology ====&lt;br /&gt;
You can get credits if you have working experience in IT field. More information can be found here: [[ITX8512]]&lt;br /&gt;
&lt;br /&gt;
== Thesis and graduation ==&lt;br /&gt;
The fourth semester is reserved for writing your thesis. This is a demonstration of your professional knowledge and skills, and the process typically involves the following steps (with the help of your supervisor):&lt;br /&gt;
* identify a problem that matters&lt;br /&gt;
* research possible solutions, and select or develop the most suitable one&lt;br /&gt;
* implement the solution&lt;br /&gt;
* analyze the results of your work&lt;br /&gt;
* present your work in a professional manner in written (thesis) and oral (thesis defence) form&lt;br /&gt;
&lt;br /&gt;
[http://courses.cs.ttu.ee/pages/Thesis Thesis information] - deadlines, proposed topics, requirements, etc.&lt;br /&gt;
&lt;br /&gt;
== Scholarships ==&lt;br /&gt;
&lt;br /&gt;
There are special IT-Academy scholarships available for Cyber Security students. The scholarships are awarded based on rank in admission and the study results in the previous semesters. You will have to apply for this scholarship on OIS and OIS will also tell you if you qualify for it. Check also: [http://www.ttu.ee/public/i/infotehnoloogia-teaduskond/Tudengile/ITA/IT_Academy__stipend_M_english.docx statute of the scholarship], which is available on the faculty web site.&lt;br /&gt;
&lt;br /&gt;
In addition, you can apply for [http://www.studyitin.ee/scholarship/skype-scholarship Skype and IT Academy Master’s Scholarship] and [http://www.studyitin.ee/scholarship/lhv-scholarship LHV Bank Scholarship].&lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
* [http://www.ttu.ee/?lang=en Tallinn University of Technology]&lt;br /&gt;
** [http://www.ttu.ee/studying/new-and-current-student/ International Study Centre] will help you in the first steps at TUT and provides useful help along your studies.&lt;br /&gt;
** See also [http://www.ttu.ee/public/u/ulikool/kontakt/TTU_Campusekaart_juuli2010.pdf campus maps]&lt;br /&gt;
** [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/home-2/ Faculty of Information Technology]&lt;br /&gt;
** Dean&amp;#039;s Office of IT dept: room ICT-407, phone 6203528, email i@ttu.ee &lt;br /&gt;
** program coordinator Rain Ottis, rain.ottis@ttu.ee, room ICT-430, Akadeemia 15a. Consultancy registration via e-mail.&lt;br /&gt;
** research coordinator [http://www.ttu.ee/en/personnel-search/&amp;amp;kood=T0067160 Olaf Maennel], olaf.maennel@ttu.ee, ICT-420, Akadeemia 15a. Consultancy registration via e-mail.&lt;br /&gt;
* [http://www.ut.ee/en University of Tartu]&lt;br /&gt;
** [http://www.cs.ut.ee/en Institute of Computer Science]&lt;br /&gt;
** program coordinator [http://vvv.cs.ut.ee/~unruh/ Dominique Unruh]&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3825</id>
		<title>ITX8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3825"/>
		<updated>2016-01-30T18:39:44Z</updated>

		<summary type="html">&lt;p&gt;Kaur: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= LOCKED SHIELDS 2016 version =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= STRATEGY / CYBER CHALLENGE PREP version =&lt;br /&gt;
&lt;br /&gt;
* Instructor: Tiia Sõmer&lt;br /&gt;
* Topic: management of cyber security at a strategic level. The course will be taught by invited speakers (from Estonia and international), putting main effort to the practical side of strategic cyber security. The course is also designed to prepare students for the 9/12 Cyber Challenge, but participation does not guarantee a slot on the TUT team.&lt;br /&gt;
* First meeting: &amp;#039;&amp;#039;&amp;#039;05 Nov 2015&amp;#039;&amp;#039;&amp;#039; at &amp;#039;&amp;#039;&amp;#039;1800-1930&amp;#039;&amp;#039;&amp;#039; in &amp;#039;&amp;#039;&amp;#039;ICT-315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
== Schedule ==&lt;br /&gt;
NB! Check for updates regularly!&lt;br /&gt;
&lt;br /&gt;
=== 05.11 ===&lt;br /&gt;
Introduction to the course (Tiia Sõmer) [[Meedia:001_05NOV15.pptx]]&lt;br /&gt;
&lt;br /&gt;
Strategic issues in cyber security (Rain Ottis)&lt;br /&gt;
&lt;br /&gt;
Cyber Challenge 2015 experience (Wael AbuSeada)&lt;br /&gt;
&lt;br /&gt;
=== 12.11 ===&lt;br /&gt;
&lt;br /&gt;
International actors in cyberspace, role of small states in international arena (Liina Areng) [[Meedia:002_12NOV15_LA.pdf]]&lt;br /&gt;
&lt;br /&gt;
E-Diplomacy (Tanel Sepp)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;#039;&amp;#039;&amp;#039;19.11 -&amp;gt; 20.11&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;PLEASE NOTE THE CHANGE OF DATE TO 20NOV 2015 !!!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;THE LECTURE WILL BE HELD IN THE SAME ROOM AS USUALLY: ICT 315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
UN and Cyber Security (Peter Pedak) [[Meedia:003_20NOV15_PP.pdf]]&lt;br /&gt;
&lt;br /&gt;
EU and cyber security. EU Cyber Security Structure. The functioning of EU (Luukas Ilves)&lt;br /&gt;
&lt;br /&gt;
NATO and Cyber Security (Hannes Krause) [[Meedia:004_20NOV15_HK.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== 26.11 -&amp;gt; 27.11 ===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;PLEASE NOTE THE CHANGE OF DATE TO 27 NOV 2015 !!!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;THE LECTURE WILL BE HELD IN THE SAME ROOM AS USUALLY: ICT 315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Comparative analysis of cyber security strategies (Kadri Kaska)[[Meedia:005_27NOV15_KK.pdf]]&lt;br /&gt;
&lt;br /&gt;
General principles of International law applicable in cyberspace (Pascale Brangetto)[[Meedia:006_27NOV15_PB.pdf]]&lt;br /&gt;
&lt;br /&gt;
Writing policy briefs (Dr Mika Kerttunen)&lt;br /&gt;
&lt;br /&gt;
=== 03.12 -&amp;gt; 07.12 ===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;DATE HAS BEEN CHANGED TO 07 DECEMBER&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Cyber security and national security. Decision-making on cyber at national level. (Kristjan Prikk) [[Meedia:009_07DEC15_KP.pdf]]&lt;br /&gt;
&lt;br /&gt;
Critical Infrastructure and Critical Information Infrastructure (Urmo Sutermäe) [[Meedia:008_07DEC15_US.pdf]]&lt;br /&gt;
&lt;br /&gt;
Crisis Management in Cyber (Lauri Luht) [[Meedia:007_07DEC15_LL.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== 10.12 ===&lt;br /&gt;
Media involvement/ strategic communications in cyber crisis (Liisa Past)&lt;br /&gt;
&lt;br /&gt;
Strategic communications is a somewhat underrated aspect in crisis management. This lecture will give you insight into how STRATCOM can be used to your advantage in times of crisis. The lecture will take place in the form of seminar, please come with your questions and thoughts and be ready to discuss the topic.&lt;br /&gt;
&lt;br /&gt;
=== WRITTEN ASSIGNMENT ====&lt;br /&gt;
&lt;br /&gt;
This assignment can be completed either individually or as teamwork. In individual task, you will have to provide one policy recommendation; in case you opt for teamwork you should provide policy recommendations from one perspective per person in the group. The maximum group size can be 4 persons.&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Deadline for submission of written assignment is 10 January 2016&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;INSTRUCTIONS&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
You are cyber security advisor to the Government of one country. A major cyber incident is occurring that affects the country’s national security. The Head of Government needs information on the full range of ongoing crisis and policy response alternatives available to respond, and you have been tasked to develop policy recommendation to the Government. You should provide policy recommendation from one of the following perspectives:&lt;br /&gt;
&lt;br /&gt;
-	Crisis management at national level;&lt;br /&gt;
&lt;br /&gt;
-	Critical infrastructure;&lt;br /&gt;
&lt;br /&gt;
-	Private sector; &lt;br /&gt;
&lt;br /&gt;
-	Diplomacy/ international organisations;&lt;br /&gt;
&lt;br /&gt;
-	Legal;&lt;br /&gt;
&lt;br /&gt;
-	Cyber security. &lt;br /&gt;
&lt;br /&gt;
To present your policy recommendation, you will have to keep in mind all aspects in order to successfully synthesize useful policy measures from the limited information available. &lt;br /&gt;
&lt;br /&gt;
You will be provided with fictional information on the background and current situation of a major cyber attack. The scenario will present a fictional account of political and economic developments leading up to the cyber incident. You are restricted to the facts provided within the coming week in order to formulate your analysis. &lt;br /&gt;
You will have to &amp;#039;&amp;#039;&amp;#039;provide a WRITTEN POLICY PAPER of 1500 words&amp;#039;&amp;#039;&amp;#039;. This will be an analytical paper, discussing the potential implications of the cyber attack for different state and non-state actors and exploring one policy recommendation from selected perspective as chosen in depth. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Some tips:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
-	Don’t fight the scenario – assume the information given is true, and explore the implications of that information, not plausibility of scenario.&lt;br /&gt;
&lt;br /&gt;
-	Be creative – cyber policy is an evolving discourse and there is no single correct policy response to any scenario. There can be many ideas to experiment with in responding to crisis. &lt;br /&gt;
&lt;br /&gt;
-	Analyse the issues – it will be more important to analyse the issues than to list all possible problems or solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Information on background and current situation&amp;#039;&amp;#039;&amp;#039; of cyber attack affecting the country:&lt;br /&gt;
&lt;br /&gt;
The country in question is the U.S. and you are asked to give advise to the Cybersecurity Directorate of the National Security Staff. The packet attached herewith contains fictional information on the background and current situation of a major cyber attack affecting the United States. The scenario added represents fictional account of political and economic developments leading to the cyber incident. You are restricted to the facts contained in the attached documents in formulating your answers. &lt;br /&gt;
&lt;br /&gt;
Your recommendation must analyse the possible strengths, weaknesses, opportunities and threats of the proposed policy alternative. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Scenario packet:&amp;#039;&amp;#039;&amp;#039; [[Meedia:strat_course_written_assignment_2015.pdf]]&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3624</id>
		<title>ITX8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3624"/>
		<updated>2016-01-05T11:19:14Z</updated>

		<summary type="html">&lt;p&gt;Kaur: /* LOCKED SHIELDS 2016 version */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= LOCKED SHIELDS 2016 version =&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Instructor:&amp;#039;&amp;#039;&amp;#039; Kaur Kasak, kaur.kasak [ at ] gmail.com&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Topic:&amp;#039;&amp;#039;&amp;#039; Exercise Locked Shields 2016. Student&amp;#039;s role: Test Run Blue Team, Execution White Team support&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Objectives:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** Provide the students a practical experience in &amp;#039;&amp;#039;&amp;#039;assembling a defensive team and preparing a defensive campaign&amp;#039;&amp;#039;&amp;#039; according to exercise scenario. This will be accomplished by engaging the students into the Blue Teams of LS16 Test Run.&lt;br /&gt;
** Provide the students an experience in &amp;#039;&amp;#039;&amp;#039;responding to full-scale cyber attack campaign&amp;#039;&amp;#039;&amp;#039; by tasking them to protect exercise networks during one day lasting attack campaign.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Use the help of the students to run LS16&amp;#039;&amp;#039;&amp;#039;. Provide the students insight how technical cyber defence exercises are organized. The students will be engaged into the White Team after the Test Run. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Limitations&amp;#039;&amp;#039;&amp;#039;: &lt;br /&gt;
** 3 Student Blue Teams, (up to) 12 + 12 + 12 students&lt;br /&gt;
** LS16 will be UNCLASS exercise, but &amp;#039;&amp;#039;&amp;#039;participation is only open to persons who have nationality of a NATO nation&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Important Dates&amp;#039;&amp;#039;&amp;#039;:&lt;br /&gt;
&lt;br /&gt;
** First meeting: TBD Feb 2016&lt;br /&gt;
** 01 Feb - 08 Mar 2016: Intensive preparation period&lt;br /&gt;
** 09-10 Mar 2016: Access to systems. Test Run (full-day events!)&lt;br /&gt;
** 19-21 Apr 2016: Execution (full-day events!) &lt;br /&gt;
* All other information will be provided through another collaboration environment. In case you have registered but have not received the invitation by &amp;#039;&amp;#039;&amp;#039;TBD Feb 2016&amp;#039;&amp;#039;&amp;#039;, please contact kaur.kasak [ at ] gmail.com&lt;br /&gt;
&lt;br /&gt;
= STRATEGY / CYBER CHALLENGE PREP version =&lt;br /&gt;
&lt;br /&gt;
* Instructor: Tiia Sõmer&lt;br /&gt;
* Topic: management of cyber security at a strategic level. The course will be taught by invited speakers (from Estonia and international), putting main effort to the practical side of strategic cyber security. The course is also designed to prepare students for the 9/12 Cyber Challenge, but participation does not guarantee a slot on the TUT team.&lt;br /&gt;
* First meeting: &amp;#039;&amp;#039;&amp;#039;05 Nov 2015&amp;#039;&amp;#039;&amp;#039; at &amp;#039;&amp;#039;&amp;#039;1800-1930&amp;#039;&amp;#039;&amp;#039; in &amp;#039;&amp;#039;&amp;#039;ICT-315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
== Schedule ==&lt;br /&gt;
NB! Check for updates regularly!&lt;br /&gt;
&lt;br /&gt;
=== 05.11 ===&lt;br /&gt;
Introduction to the course (Tiia Sõmer) [[Meedia:001_05NOV15.pptx]]&lt;br /&gt;
&lt;br /&gt;
Strategic issues in cyber security (Rain Ottis)&lt;br /&gt;
&lt;br /&gt;
Cyber Challenge 2015 experience (Wael AbuSeada)&lt;br /&gt;
&lt;br /&gt;
=== 12.11 ===&lt;br /&gt;
&lt;br /&gt;
International actors in cyberspace, role of small states in international arena (Liina Areng) [[Meedia:002_12NOV15_LA.pdf]]&lt;br /&gt;
&lt;br /&gt;
E-Diplomacy (Tanel Sepp)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;#039;&amp;#039;&amp;#039;19.11 -&amp;gt; 20.11&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;PLEASE NOTE THE CHANGE OF DATE TO 20NOV 2015 !!!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;THE LECTURE WILL BE HELD IN THE SAME ROOM AS USUALLY: ICT 315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
UN and Cyber Security (Peter Pedak) [[Meedia:003_20NOV15_PP.pdf]]&lt;br /&gt;
&lt;br /&gt;
EU and cyber security. EU Cyber Security Structure. The functioning of EU (Luukas Ilves)&lt;br /&gt;
&lt;br /&gt;
NATO and Cyber Security (Hannes Krause) [[Meedia:004_20NOV15_HK.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== 26.11 -&amp;gt; 27.11 ===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;PLEASE NOTE THE CHANGE OF DATE TO 27 NOV 2015 !!!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;THE LECTURE WILL BE HELD IN THE SAME ROOM AS USUALLY: ICT 315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Comparative analysis of cyber security strategies (Kadri Kaska)[[Meedia:005_27NOV15_KK.pdf]]&lt;br /&gt;
&lt;br /&gt;
General principles of International law applicable in cyberspace (Pascale Brangetto)[[Meedia:006_27NOV15_PB.pdf]]&lt;br /&gt;
&lt;br /&gt;
Writing policy briefs (Dr Mika Kerttunen)&lt;br /&gt;
&lt;br /&gt;
=== 03.12 -&amp;gt; 07.12 ===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;DATE HAS BEEN CHANGED TO 07 DECEMBER&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Cyber security and national security. Decision-making on cyber at national level. (Kristjan Prikk) [[Meedia:009_07DEC15_KP.pdf]]&lt;br /&gt;
&lt;br /&gt;
Critical Infrastructure and Critical Information Infrastructure (Urmo Sutermäe) [[Meedia:008_07DEC15_US.pdf]]&lt;br /&gt;
&lt;br /&gt;
Crisis Management in Cyber (Lauri Luht) [[Meedia:007_07DEC15_LL.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== 10.12 ===&lt;br /&gt;
Media involvement/ strategic communications in cyber crisis (Liisa Past)&lt;br /&gt;
&lt;br /&gt;
Strategic communications is a somewhat underrated aspect in crisis management. This lecture will give you insight into how STRATCOM can be used to your advantage in times of crisis. The lecture will take place in the form of seminar, please come with your questions and thoughts and be ready to discuss the topic.&lt;br /&gt;
&lt;br /&gt;
=== WRITTEN ASSIGNMENT ====&lt;br /&gt;
&lt;br /&gt;
This assignment can be completed either individually or as teamwork. In individual task, you will have to provide one policy recommendation; in case you opt for teamwork you should provide policy recommendations from one perspective per person in the group. The maximum group size can be 4 persons.&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Deadline for submission of written assignment is 10 January 2016&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;INSTRUCTIONS&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
You are cyber security advisor to the Government of one country. A major cyber incident is occurring that affects the country’s national security. The Head of Government needs information on the full range of ongoing crisis and policy response alternatives available to respond, and you have been tasked to develop policy recommendation to the Government. You should provide policy recommendation from one of the following perspectives:&lt;br /&gt;
&lt;br /&gt;
-	Crisis management at national level;&lt;br /&gt;
&lt;br /&gt;
-	Critical infrastructure;&lt;br /&gt;
&lt;br /&gt;
-	Private sector; &lt;br /&gt;
&lt;br /&gt;
-	Diplomacy/ international organisations;&lt;br /&gt;
&lt;br /&gt;
-	Legal;&lt;br /&gt;
&lt;br /&gt;
-	Cyber security. &lt;br /&gt;
&lt;br /&gt;
To present your policy recommendation, you will have to keep in mind all aspects in order to successfully synthesize useful policy measures from the limited information available. &lt;br /&gt;
&lt;br /&gt;
You will be provided with fictional information on the background and current situation of a major cyber attack. The scenario will present a fictional account of political and economic developments leading up to the cyber incident. You are restricted to the facts provided within the coming week in order to formulate your analysis. &lt;br /&gt;
You will have to &amp;#039;&amp;#039;&amp;#039;provide a WRITTEN POLICY PAPER of 1500 words&amp;#039;&amp;#039;&amp;#039;. This will be an analytical paper, discussing the potential implications of the cyber attack for different state and non-state actors and exploring one policy recommendation from selected perspective as chosen in depth. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Some tips:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
-	Don’t fight the scenario – assume the information given is true, and explore the implications of that information, not plausibility of scenario.&lt;br /&gt;
&lt;br /&gt;
-	Be creative – cyber policy is an evolving discourse and there is no single correct policy response to any scenario. There can be many ideas to experiment with in responding to crisis. &lt;br /&gt;
&lt;br /&gt;
-	Analyse the issues – it will be more important to analyse the issues than to list all possible problems or solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Information on background and current situation&amp;#039;&amp;#039;&amp;#039; of cyber attack affecting the country:&lt;br /&gt;
&lt;br /&gt;
The country in question is the U.S. and you are asked to give advise to the Cybersecurity Directorate of the National Security Staff. The packet attached herewith contains fictional information on the background and current situation of a major cyber attack affecting the United States. The scenario added represents fictional account of political and economic developments leading to the cyber incident. You are restricted to the facts contained in the attached documents in formulating your answers. &lt;br /&gt;
&lt;br /&gt;
Your recommendation must analyse the possible strengths, weaknesses, opportunities and threats of the proposed policy alternative. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Scenario packet:&amp;#039;&amp;#039;&amp;#039; [[Meedia:strat_course_written_assignment_2015.pdf]]&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3234</id>
		<title>ITX8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=3234"/>
		<updated>2015-10-28T08:02:10Z</updated>

		<summary type="html">&lt;p&gt;Kaur: /* LOCKED SHIELDS 2016 version */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= LOCKED SHIELDS 2016 version =&lt;br /&gt;
&lt;br /&gt;
* Instructor: Kaur Kasak&lt;br /&gt;
* Topic: Exercise Locked Shields 2016. Student&amp;#039;s role: Test Run Blue Team, Execution White Team support&lt;br /&gt;
* Objectives:&lt;br /&gt;
** Provide the students a practical experience in &amp;#039;&amp;#039;&amp;#039;assembling a defensive team and preparing a defensive campaign&amp;#039;&amp;#039;&amp;#039; according to exercise scenario. This will be accomplished by engaging the students into the Blue Teams of LS16 Test Run.&lt;br /&gt;
** Provide the students an experience in &amp;#039;&amp;#039;&amp;#039;responding to full-scale cyber attack campaign&amp;#039;&amp;#039;&amp;#039; by tasking them to protect exercise networks during one day lasting attack campaign.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Use the help of the students to run LS16&amp;#039;&amp;#039;&amp;#039;. Provide the students insight how technical cyber defence exercises are organized. The students will be engaged into the White Team after the Test Run. &lt;br /&gt;
* Limitation: &lt;br /&gt;
** 3 Student Blue Teams, (up to) 12 + 12 + 12 students&lt;br /&gt;
** LS16 will be UNCLASS exercise, but &amp;#039;&amp;#039;&amp;#039;participation is only open to persons who have nationality of a NATO nation&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* First meeting: &amp;#039;&amp;#039;&amp;#039;TBD Feb 2016&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* All other information will be provided through another collaboration environment. In case you have registered but have not received the invitation by &amp;#039;&amp;#039;&amp;#039;TBD Feb 2016&amp;#039;&amp;#039;&amp;#039;, please contact kaur.kasak [ at ] gmail.com&lt;br /&gt;
&lt;br /&gt;
= STRATEGY / CYBER CHALLENGE PREP version =&lt;br /&gt;
&lt;br /&gt;
* Instructor: Tiia Sõmer&lt;br /&gt;
* Topic: management of cyber security at a strategic level. The course will be taught by invited speakers (from Estonia and international), putting main effort to the practical side of strategic cyber security. The course is also designed to prepare students for the 9/12 Cyber Challenge, but participation does not guarantee a slot on the TUT team.&lt;br /&gt;
* First meeting: &amp;#039;&amp;#039;&amp;#039;05 Nov 2015&amp;#039;&amp;#039;&amp;#039; at &amp;#039;&amp;#039;&amp;#039;1800-1930&amp;#039;&amp;#039;&amp;#039; in &amp;#039;&amp;#039;&amp;#039;ICT-315&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
== Schedule ==&lt;br /&gt;
NB! Check for updates regularly!&lt;br /&gt;
&lt;br /&gt;
=== 05.11 ===&lt;br /&gt;
Introduction to the course (Tiia Sõmer)&lt;br /&gt;
&lt;br /&gt;
Strategic issues in cyber security (Rain Ottis)&lt;br /&gt;
&lt;br /&gt;
Cyber security and national security. Decision-making on cyber at national level. (Kristjan Prikk)&lt;br /&gt;
&lt;br /&gt;
International system and decision-making on cyber at International level (TBC)&lt;br /&gt;
&lt;br /&gt;
=== 12.11 ===&lt;br /&gt;
State actors in cyberspace (TBC)&lt;br /&gt;
&lt;br /&gt;
International actors in cyberspace, role of small states in international arena (Liina Areng)&lt;br /&gt;
&lt;br /&gt;
E-Diplomacy (Tanel Sepp)&lt;br /&gt;
&lt;br /&gt;
=== 19.11 ===&lt;br /&gt;
EU and cyber security. EU Cyber Security Structure. The functioning of EU(Heli Tiirmaa-Klaar, EEAS)&lt;br /&gt;
&lt;br /&gt;
NATO and Cyber Security (Christian-Marc Liflander, NATO)&lt;br /&gt;
&lt;br /&gt;
UN and Cyber Security (TBC)&lt;br /&gt;
&lt;br /&gt;
=== 26.11 ===&lt;br /&gt;
General principles of International law applicable in cyberspace&lt;br /&gt;
&lt;br /&gt;
Role of Defense Forces in national and International cyber security&lt;br /&gt;
&lt;br /&gt;
Law of Armed Conflict in cyber &lt;br /&gt;
&lt;br /&gt;
Countermeasures and sanctions&lt;br /&gt;
&lt;br /&gt;
Writing policy briefs&lt;br /&gt;
&lt;br /&gt;
=== 03.12 ===&lt;br /&gt;
Territorial Sovereignity and integrity in cyberspace (TBC)&lt;br /&gt;
&lt;br /&gt;
International cooperation in solving crisis of cyber nature (Tanya Collingridge, Head of International Cyber Policy, UK FCO Cyber Policy Dept)&lt;br /&gt;
&lt;br /&gt;
=== 10.12 ===&lt;br /&gt;
Critical Infrastructure and Critical Information Infrastructure (TBC)&lt;br /&gt;
&lt;br /&gt;
Crisis Management in Cyber (Lauri Luht, EISA)&lt;br /&gt;
&lt;br /&gt;
Media involvement/ role in cyber crisis (Raul Rebane)&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=135</id>
		<title>ITX8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=135"/>
		<updated>2014-02-05T12:54:13Z</updated>

		<summary type="html">&lt;p&gt;Kaur: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* Topic: Exercise Locked Shields 2014. Student&amp;#039;s role: Test Run Blue Team, Execution White Team support&lt;br /&gt;
* Limitation: 2 Student Blue Teams, (up to) 10 + 10 students&lt;br /&gt;
* First meeting: &amp;#039;&amp;#039;&amp;#039;12 Feb 2014&amp;#039;&amp;#039;&amp;#039; at &amp;#039;&amp;#039;&amp;#039;18:00 - 19:30&amp;#039;&amp;#039;&amp;#039; in &amp;#039;&amp;#039;&amp;#039;ICT-411&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* All other information will be provided through another collaboration environment. In case you have registered but have not received the invitation by &amp;#039;&amp;#039;&amp;#039;09 Feb 2014&amp;#039;&amp;#039;&amp;#039;, please contact kaur.kasak [ at ] gmail.com&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=114</id>
		<title>ITX8050</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8050&amp;diff=114"/>
		<updated>2014-02-05T00:07:19Z</updated>

		<summary type="html">&lt;p&gt;Kaur: Uus lehekülg: &amp;#039; * Topic: Exercise Locked Shields 2014. Student&amp;#039;s role: Test Run Blue Team, Execution White Team support * Limitation: 2 Student Blue Teams, (up to) 10 + 10 students * First meet...&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* Topic: Exercise Locked Shields 2014. Student&amp;#039;s role: Test Run Blue Team, Execution White Team support&lt;br /&gt;
* Limitation: 2 Student Blue Teams, (up to) 10 + 10 students&lt;br /&gt;
* First meeting: &amp;#039;&amp;#039;&amp;#039;12 Feb 2014&amp;#039;&amp;#039;&amp;#039; at &amp;#039;&amp;#039;&amp;#039;18:00 - 19:30&amp;#039;&amp;#039;&amp;#039; in ICT-TBD. &lt;br /&gt;
* All other information will be provided through another collaboration environment. In case you have registered but have not received the invitation by &amp;#039;&amp;#039;&amp;#039;09 Feb 2014&amp;#039;&amp;#039;&amp;#039;, please contact kaur.kasak [ at ] gmail.com&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_second_year&amp;diff=113</id>
		<title>Cyber second year</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_second_year&amp;diff=113"/>
		<updated>2014-02-05T00:00:46Z</updated>

		<summary type="html">&lt;p&gt;Kaur: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Courses ==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8080&amp;#039;&amp;#039;&amp;#039; Simulation of Attacks and Defense&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITV8060&amp;#039;&amp;#039;&amp;#039; Computer Network Security (4 EAP) is available and free on Fall for cybersecurity 2. year students and can be moved to Specialization module after you have got a grade.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8071&amp;#039;&amp;#039;&amp;#039; Cyber Defense Monitoring Solutions replaces the course ITX8070 Log Mining and Disc Forensics. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; [http://courses.cs.ttu.ee/pages/ITX8040 Cyber Defence seminar] (spring semester)&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8042&amp;#039;&amp;#039;&amp;#039; [http://lambda.ee/w/index.php?title=Malware:ITX8042:2013 Malware] &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8042&amp;#039;&amp;#039;&amp;#039; [http://lambda.ee/w/index.php?title=Malware:ITX8060:2013 Malware II]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8062&amp;#039;&amp;#039;&amp;#039; [[ITX8062 | Information Systems Mass Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8063&amp;#039;&amp;#039;&amp;#039; [[ITX8063 | Information Systems Hacking Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8050&amp;#039;&amp;#039;&amp;#039; [[ITX8050 | Special Course in Cyber Security]]&lt;br /&gt;
&lt;br /&gt;
The courses are free to cybersecurity RE students (the invoices are cancelled) and can be moved to Specialization module after you get a grade.&lt;br /&gt;
&lt;br /&gt;
== Writing a Thesis ==&lt;br /&gt;
&lt;br /&gt;
=== Topic and advisor ===&lt;br /&gt;
Almost any professor and lecturer you have met in your curricula can act as an advisor of you thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many don&amp;#039;t have a topic to offer. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have an advisor not related to the university, but he can act only as a co-advisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curricula to be an official advisor. &lt;br /&gt;
&lt;br /&gt;
When refining topic ideas, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
The topics or keywords below are offered by potential (co-)supervisors. The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
===== From the TUT IT office =====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
===== From Arnis Paršovs, University of Tartu, arnis@ut.ee =====&lt;br /&gt;
* Topic: On-the-fly encryption for car DVR&lt;br /&gt;
Task: Implement on-the-fly encryption functionality for Prestigio car DVR (by patching publicly available firmware - possibly by hooking write calls).&lt;br /&gt;
Use of hybrid encryption is recommended, however, implementation of scrambling (e.g., XORing with a fixed key) might already be considered success.&lt;br /&gt;
Describe the threat model, how it was done and how to use it.&lt;br /&gt;
&lt;br /&gt;
* Topic: Parallel tallying for Estonian i-voting&lt;br /&gt;
Task: Describe security risks that could be reduced if election observers would be allowed to perform vote verification and counting using their computers. Propose changes to the i-voting procedures and develop parallel tallying reference implementation and test data set. Analyse new risks introduced and propose counter measures.&lt;br /&gt;
&lt;br /&gt;
* Topic: Perfect Secrecy for TLS&lt;br /&gt;
Task: Create an Internet Draft proposing a TLS cipher suite or extension that would ensure perfect secrecy using one-time pad. Develop a proof-of-concept patch for OpenSSL/mod_ssl and Firefox. Analyze the security and usability, describe the use cases.&lt;br /&gt;
&lt;br /&gt;
* Topic: TLS Session Resumption and ID card Authentication&lt;br /&gt;
Task: Study how TLS session resumption is implemented in browsers. Measure and compare the performance improvement TLS session resumption provides. Measure the performance impact if the TLS client certificate authentication is performed using a smart card.&lt;br /&gt;
&lt;br /&gt;
===== TREsPASS project =====&lt;br /&gt;
* Research project: [http://www.trespass-project.eu/ Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security]&lt;br /&gt;
The project is also suitable for PhD research, following the completion of the Master&amp;#039;s studies.&lt;br /&gt;
Contacts: Dr Peeter Laud, Dr Jan Willemson&lt;br /&gt;
&lt;br /&gt;
=== Formal Requirements and recommendations ===&lt;br /&gt;
There are no strict rules on formatting your thesis. Some general advices that are good to follow for a master thesis:&lt;br /&gt;
* a title page, an author declaration, an annotation in english and estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* around 50 pages + appendixes if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* headings are numbered and no more than 3 levels used&lt;br /&gt;
* 2 copies are submitted, you will get one back afterwards.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The [http://www.lambda.ee/wiki/ITX8045 Cyber Security Seminar] is designed to provide advice on the thesis requirements and writing process to Cyber Security Master&amp;#039;s students.&lt;br /&gt;
&lt;br /&gt;
=== Dates (2013 spring) ===&lt;br /&gt;
* May 13 deadline for application of defending the thesis&lt;br /&gt;
* May 27, 9.00 - 11.00 and 15.00 - 17.00, submission of the thesis (two copies to ICT-411)&lt;br /&gt;
* June 3 ([http://www.ttu.ee/infotehnoloogia-teaduskond/arvutiteaduse-instituut/at-tudengile/lopetamine-2/ Schedule]) defenses of the thesis (presentation 15 minutes + discussion)&lt;br /&gt;
* After defense, please, visit Dean&amp;#039;s Office for more information about final formalities&lt;br /&gt;
* June 19 - 28 final ceremony&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
Your advisor may have different suggestions, but if they don&amp;#039;t say anything then you should plan to have a first draft ready by the end of April.&lt;br /&gt;
&lt;br /&gt;
=== Links ===&lt;br /&gt;
[http://www.cs.ut.ee/en/node/3301/mid/1046 Some advises and requirements for writing a thesis in UT]&lt;br /&gt;
&lt;br /&gt;
[http://www.ttu.ee/infotehnoloogia-teaduskond/arvutiteaduse-instituut/at-tudengile/lopetamine-2/ Some advises and requirements for writing a thesis in TTU (in Estonian)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8063&amp;diff=52</id>
		<title>ITX8063</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8063&amp;diff=52"/>
		<updated>2013-10-29T20:29:22Z</updated>

		<summary type="html">&lt;p&gt;Kaur: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
All information related with this course will be provided through separate collaboration environment. To get access, send an e-mail to Sten&lt;br /&gt;
* emailsten[-at-]gmail.com&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8063&amp;diff=51</id>
		<title>ITX8063</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8063&amp;diff=51"/>
		<updated>2013-10-29T15:39:02Z</updated>

		<summary type="html">&lt;p&gt;Kaur: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
All information related with this course will be provided through separate collaboration environment. To get access, send an e-mail to course instructor&lt;br /&gt;
* kaur.kasak[-at-]gmail.com&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=ITX8063&amp;diff=50</id>
		<title>ITX8063</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=ITX8063&amp;diff=50"/>
		<updated>2013-10-27T15:08:13Z</updated>

		<summary type="html">&lt;p&gt;Kaur: Uus lehekülg: &amp;#039;= IT Systems Hacking Attacks and Defence =&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= IT Systems Hacking Attacks and Defence =&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_second_year&amp;diff=49</id>
		<title>Cyber second year</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_second_year&amp;diff=49"/>
		<updated>2013-10-27T15:06:33Z</updated>

		<summary type="html">&lt;p&gt;Kaur: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Courses ==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8080&amp;#039;&amp;#039;&amp;#039; Simulation of Attacks and Defense&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITV8060&amp;#039;&amp;#039;&amp;#039; Computer Network Security (4 EAP) is available and free on Fall for cybersecurity 2. year students and can be moved to Specialization module after you have got a grade.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8071&amp;#039;&amp;#039;&amp;#039; Cyber Defense Monitoring Solutions replaces the course ITX8070 Log Mining and Disc Forensics. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; Cyberdefence seminar will take place on Spring semester&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8042&amp;#039;&amp;#039;&amp;#039; [http://lambda.ee/w/index.php?title=Malware:ITX8042:2013 Malware] &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8042&amp;#039;&amp;#039;&amp;#039; [http://lambda.ee/w/index.php?title=Malware:ITX8060:2013 Malware II]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8062&amp;#039;&amp;#039;&amp;#039; [[ITX8062 | Information Systems Mass Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8063&amp;#039;&amp;#039;&amp;#039; [[ITX8063 | Information Systems Hacking Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
The courses are free to cybersecurity RE students (the invoices are cancelled) and can be moved to Specialization module after you get a grade.&lt;br /&gt;
&lt;br /&gt;
== Writing a Thesis ==&lt;br /&gt;
&lt;br /&gt;
=== Topic and advisor ===&lt;br /&gt;
Almost any professor and lecturer you have met in your curricula can act as an advisor of you thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many don&amp;#039;t have a topic to offer. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have an advisor not related to the university, but he can act only as a co-advisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curricula to be an official advisor. &lt;br /&gt;
&lt;br /&gt;
When refining topic ideas, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
The topics or keywords below are offered by potential (co-)supervisors. The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
===== From the TUT IT office =====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
===== From Arnis Paršovs, University of Tartu, arnis@ut.ee =====&lt;br /&gt;
* Topic: Security analysis of peer-to-peer messaging protocol TorChat.&lt;br /&gt;
Task: Find out and describe how secure message exchange is established and what is the threat model it protects against.&lt;br /&gt;
Describe how it could possibly be attacked and review if secure coding practices are followed.&lt;br /&gt;
&lt;br /&gt;
* Topic: On-the-fly encryption for car DVR&lt;br /&gt;
Task: Implement on-the-fly encryption functionality for Prestigio car DVR (by patching publicly available firmware - possibly by hooking write calls).&lt;br /&gt;
Use of hybrid encryption is recommended, however, implementation of scrambling (e.g., XORing with a fixed key) might already be considered success.&lt;br /&gt;
Describe the threat model, how it was done and how to use it.&lt;br /&gt;
&lt;br /&gt;
===== TREsPASS project =====&lt;br /&gt;
* Research project: [http://www.trespass-project.eu/ Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security]&lt;br /&gt;
The project is also suitable for PhD research, following the completion of the Master&amp;#039;s studies.&lt;br /&gt;
Contacts: Dr Peeter Laud, Dr Jan Willemson&lt;br /&gt;
&lt;br /&gt;
=== Formal Requirements and recommendations ===&lt;br /&gt;
There are no strict rules on formatting your thesis. Some general advices that are good to follow for a master thesis:&lt;br /&gt;
* a title page, an author declaration, an annotation in english and estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* around 50 pages + appendixes if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* headings are numbered and no more than 3 levels used&lt;br /&gt;
* 2 copies are submitted, you will get one back afterwards.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The [http://www.lambda.ee/wiki/ITX8045 Cyber Security Seminar] is designed to provide advice on the thesis requirements and writing process to Cyber Security Master&amp;#039;s students.&lt;br /&gt;
&lt;br /&gt;
=== Dates (2013 spring) ===&lt;br /&gt;
* May 13 deadline for application of defending the thesis&lt;br /&gt;
* May 27, 9.00 - 11.00 and 15.00 - 17.00, submission of the thesis (two copies to ICT-411)&lt;br /&gt;
* June 3 ([http://www.ttu.ee/infotehnoloogia-teaduskond/arvutiteaduse-instituut/at-tudengile/lopetamine-2/ Schedule]) defenses of the thesis (presentation 15 minutes + discussion)&lt;br /&gt;
* After defense, please, visit Dean&amp;#039;s Office for more information about final formalities&lt;br /&gt;
* June 19 - 28 final ceremony&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
Your advisor may have different suggestions, but if they don&amp;#039;t say anything then you should plan to have a first draft ready by the end of April.&lt;br /&gt;
&lt;br /&gt;
=== Links ===&lt;br /&gt;
[http://www.cs.ut.ee/en/node/3301/mid/1046 Some advises and requirements for writing a thesis in UT]&lt;br /&gt;
&lt;br /&gt;
[http://www.ttu.ee/infotehnoloogia-teaduskond/arvutiteaduse-instituut/at-tudengile/lopetamine-2/ Some advises and requirements for writing a thesis in TTU (in Estonian)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;/div&gt;</summary>
		<author><name>Kaur</name></author>
	</entry>
</feed>