IA455A: Contemporary Topics in Information Assurance

STUDENT PRESENTATIONS

All materials are copyrighted by their respective authors. You may link to these files, but DO NOT POST COPIES ANYWHERE ELSE WITHOUT EXPLICIT WRITTEN PERMISSION OF THE AUTHORS.

 

TOPICS -- Authors

Advanced Persistent Threats -- Mattrick, Little & Pessolano

Authentication -- Blum, Garcia & Sullivan

Backdoors & Secure Coding -- Acheson & DeSoto

Bots, Botnets & Spam -- Fox & Sheftel

Cloud Security -- Montgomery & Little

Cryptowars -- Harris & Salvas

Cyberlaw Review -- Danieli & Gibson

Data Loss Prevention -- Lockhart & Johnston

Exploits & Zero-Day Exploits -- Gariboldi, Jette & Jackson

Hackers & Hacks -- Romano & Sullivan

HIPAA -- Callahan & Johnston

Information Warfare -- DeSoto & Jackson

Intrusion Detection & Incident Response -- Mattrick & Pessolano

Iot & SCADA -- Awasthi & Fox

Malware, Antimalware & RATs -- Gariboldi & Awasthi

Man-in-the-Middle Attacks -- Callahan & Harris

Penetration Testing -- Romano & Shepardson

Ransomware -- Jette & Lockhart

Security Information & Event Management (SIEM) -- Montgomery, Salvas & Shepardson

Copyright © 2017 M. E. Kabay.  All rights reserved.

The opinions expressed in any of the writings on this Web site represent the authorís opinions and do not necessarily represent the opinions or positions of his employers, associates, colleagues, students, relatives, friends, enemies, cats, dog or plants. Materials copyrighted by M. E. Kabay from this Website may be freely used for non-commercial teaching (i.e., specifically in any courses for academic credit or in free industry training at workshops or within organizations) but may not be re-posted on any Website or used in commercial training (where participants must pay fees for participation in the conference or workshop or where the instructor is paid) without express written permission. Any unauthorized sale of these copyrighted materials will be prosecuted to the full extent of the law.

Updated 2017-11-14