Welcome to the first class of Investing Cyber Terrorism (AJU 447 / 6647). This week we will review the syllabus and the requirements of this class. We will also review the methods in which this class will be taught (hybrid). There will be four elements of instruction:
1. Classroom - We will meet in the classroom (Jennings 208) every Tuesday at 3:00 PM, with the exception of scheduled holidays...
We started off the week with ice, snow, and a day off. Unfortunately, we are going to have to play a little "catch-up." So make sure you are caught up on your reading (Handbook & Cybercrime).
Also, FEMA had some technical difficulties this week, but everybody should have the first FEMA certificate submitted this week. Some of you may have noticed that there is a delay between the time you tak...
This week we talked about the 16 Sectors of Critical Infrastructure defined by PPD-21. We also talked about the different types of cybercrimes in more detail. I have uploaded the PowerPoint for todays class. I will give 5 extra credit points on Quiz #2 (not scheduled) for anybody that brings a printed copy of the EULA for Facebook or Twitter to our next class. There are 2 "Easter Eggs" available for...
Today we talked about what a cyber warrior looks like and the different types of cyber warriors. We also talked about DDoS and APDDoS attacks and how botnets are created and used in these attacks. Thanks to Brad for playing the role of "web server" today. I will post the PowerPoint and post the recording (see embedded video). I am posting Assignment #4 on Moodle.
This week we talked about the process that a terrorist would use to conduct a cyber terrorism operation. We also talked about the 4th Amendment of U.S. Constitution, open source intelligence gathering, and the collection, examination, analysis, and the reporting of high-tech evidence. We had some audio problems during the February 13th class, so this week's class video will be in two parts.
This week we talked about anti-forensics & counter-forensics. We also discussed how digital images are created and methods used to analyzing digital evidence. Technical difficulties prevented us from viewing the following digital forensic demonstrations:
Yesterday we went over the mid-term study guide and we talked about the format of the exam. If you were not present for class (or even if you were present), you should download the study guide and watch the video below. We will meet on Zoom on Thursday, prior to the mid-term exam. Feel free to contact me if you have any questions.
Welcome back from Spring Break. It was good to see everybody made it back safely. This week we talked about CYBERCOM, DHS, and the FBI's response to a cyber attack. We also talked about the ways that the private sector comes together to help protect critical cyber assets and promotes a defense through education.
March 22, 2018
This week's cases studies involved a West Coast power company and...
This week we discussed how individuals and small units should prepare for a cyber attack, and what they can do to assist cyber investigation teams. In addition to the class recording, please make a note of the following items of interest:
1. Five points were awarded to whoever answer the quiz question, "List four (4) ways that terrorists use the Internet." I realize the question was too open-ended.
This week we talked about "Incident Response Teams" vs. "Cyber Threat Hunting." Unfortunately, the audio system died half-way through the class and I had to re-record it. I will also post the PowerPoint on the website. Everybody should be working hard on their paper.
This was our final day of class. Today we reviewed the study guide for the final exam. The final exam is on May 1, 2018 on Moodle. The exam will be available 3:00 PM to 11:55 PM . If you have any questions, please contact me prior to the date of the exam. Good luck everybody.