Erinevus lehekülje "ITX8062" redaktsioonide vahel
164. rida: | 164. rida: | ||
* 15.12.2014 1800-2100 (closed): KR, KT, AR, JW, KKu, VP, KKa, NG, NK, ZA, GL, AR | * 15.12.2014 1800-2100 (closed): KR, KT, AR, JW, KKu, VP, KKa, NG, NK, ZA, GL, AR | ||
* 18.12.2014 1800-2100 (04 slots): MK, KR, DP, LP, RA, PA, JG, VC | * 18.12.2014 1800-2100 (04 slots): MK, KR, DP, LP, RA, PA, JG, VC | ||
− | * 05.01.2015 1800-2100 ( | + | * 05.01.2015 1800-2100 (10 slots): CW, OS |
* 07.01.2015 1800-2100 (09 slots): OD, TH, ZW | * 07.01.2015 1800-2100 (09 slots): OD, TH, ZW | ||
− | * 12.01.2015 1800-2100 ( | + | * 12.01.2015 1800-2100 (05 slots): RA, IA, EI, KV, PV, DI, ES |
* 13.01.2015 1800-2100 (05 slots): TM, RK, SS, EC, MA, VA, MK | * 13.01.2015 1800-2100 (05 slots): TM, RK, SS, EC, MA, VA, MK | ||
Redaktsioon: 28. oktoober 2014, kell 10:56
Information Systems Mass Attacks and Defence (fall 2014)
Weeks 1-8 of the Fall Semester
Tuesdays 17:45-21:00
Room ICT-A1 (IT building at Akadeemia 15a, second floor)
Instructors
Rain Ottis, PhD, Associate Professor at TUT
Jaan Priisalu, Director General, Estonian Information System's Authority
Practice led by Bernhards Blumbergs
Contact: rain dot ottis at ttu dot ee
Schedule
NB! Check the schedule for updates before each lesson.
Lead instructor for lecture/practice is marked in parenthesis.
Lesson 1
02.09.2014
Introduction (Ottis, Priisalu, Blumbergs)
Research paper topic assignment and requirements (Ottis, Priisalu)
Course introduction slides (pdf), Introduction of RIA (prezi)
Lesson 2
09.09.2014
Lecture: Why is cyber security important? Critical information, dependencies, etc. (Priisalu)
Practice (Blumbergs)
Topics covered: overview of exercises, introduction of tabletop exercises in the context of this course, explaining the need for processes based on the real life examples.
Presentation is accessible here: Table top exercise concepts (Prezi)
Lesson 3
16.09.2014
Lecture: Reviewing the most important concepts of cyber security. (Priisalu)
Practice (Blumbergs)
Topics covered: Creating teams, assigning team roles, introducing scenarios and injects, playing the first game.
Lesson 4
23.09.2014
Lecture: Why cyber? Cyber conflict, espionage, terrorism, crime, etc. (Ottis) (slides)
Practice (Blumbergs)
Topics covered: Analysing the last game, playing by scenarios and with injects
Lesson 5
30.09.2014
Lecture: Cyber security planning (Ottis)
Guest lecture by Tiia Sõmer (slides)
Practice (Blumbergs, Ottis)
Topics covered: Explaining “the final game”, discussing self-written scenarios.
Lesson 6
07.10.2014
Lecture: Cyber security as an adversarial game (Priisalu)
Lesson 7
14.10.2014
Practice (Blumbergs, Ottis, Priisalu)
Tabletop exercise
Lesson 8
21.10.2014
Lecture: Preview of advanced cyber security topics.
Course summary and feedback (Ottis, Priisalu, Blumbergs)
Grade assignment
30% - Performance at the tabletop exercises
30% - Written assignment (research paper, 2000-4000 words)
40% - Oral exam
Tabletop Exercise (practice component)
It's game time! In this part of the course we will learn about war games. We will discuss their importance and practical applications in the real world and see how those games are organized. We will not only talk about them, but we will try them out as well.
The goal of this is to analyse the importance of communication processes and to understand the need to test those processes using tabletop exercises. We will create different teams with different tasks that will fall into two main categories: Red teams and Blue teams.
To the blue teams we will show that you might not have the full understanding of the situation, not enough information and resources.
To the red teams we will show that even though you might have a perfect plan, things will not go as you would want them to go.
Agenda
Lesson 2
Introduction
Processes and testing
Examples of different exercises and games from real life
Lesson 3
Creating teams, assigning roles
Introducing scenarios and injects
Playing the first game to understand what we are doing
Lesson 4
Playing the first game with scenarios and injects
Analysing the game and reports
Lesson 5
Tabletop practice.
Lesson 6
Discussing roles for the "final game".
Lesson 7
Final game
Lesson 8
Feedback
General information
Red teams will get to do less during the class exercises. However - their performance during the last exercise will be watched and graded with more detail. It requires much more independent work from the team to prepare.
EXAM
Exam times
- Note that there are limited exam slots available for each date, so register (via e-mail to dr Ottis) as soon as possible. - Send in your paper at least one week before the exam date. - Be present at the beginning of the exam. - If you do not see your initials behind the correct date (after a few days) please contact the instructor again.
* All exams take place in ICT-411 and there are 12 slots per exam time. * 15.12.2014 1800-2100 (closed): KR, KT, AR, JW, KKu, VP, KKa, NG, NK, ZA, GL, AR * 18.12.2014 1800-2100 (04 slots): MK, KR, DP, LP, RA, PA, JG, VC * 05.01.2015 1800-2100 (10 slots): CW, OS * 07.01.2015 1800-2100 (09 slots): OD, TH, ZW * 12.01.2015 1800-2100 (05 slots): RA, IA, EI, KV, PV, DI, ES * 13.01.2015 1800-2100 (05 slots): TM, RK, SS, EC, MA, VA, MK
Admin notes
- This is an oral exam. - You are allowed to use your computer/notes during the preparation. - At the beginning of the exam, each student will get two questions (may contain sub-questions). - At least one of the questions will be related to the individual paper topic or the paper itself. - Students will have time to prepare their answers.