MSIA Instructional Materials

These files were created over many years for various courses by M. E. Kabay, PhD, CISSP-ISSMP and adapted for use in the Master of Science in Information Assurance by adding narration. All of them are Copyright (c) M. E. Kabay and were licensed for use by Norwich University in the MSIA program starting in 2002 at no cost to the University.

Some of these lectures were originally used in Seminar 2 of MSIA 1.0 and then became part of Seminar 6 in the MSIA 1.5.

For more information about the current MSIA program, please see our extensive MSIA Web site.

For a glimpse of our vibrant online graduate community, see our Norwich University graduate portal.

* * *

A NOTE ABOUT THE NARRATED LECTURES:

These narrated PowerPoint files (PPTX = PowerPoint 2007 & PPT = PowerPoint 2003 and earlier) are compressed using WinZIP to save download time; open with WinZIP or compatible software and run the PPT files as slide shows with sound enabled. You can download PowerPoint Viewer 2007 software for Windows from Microsoft free to see PowerPoint files without having PowerPoint.

(Sm Wnn = Seminar m, Week nn)

 
 

QUICK LINKS FOR SINGLE-FILE PPTX DOWNLOADS:

Applied Ethics
Auditing Information Security
E-mail and Internet Use Policies
Identification & Authentication
INFOSEC Update 2006
Intellectual Property Law Review 2010
Introduction to Cryptology
Introduction to Cyberlaw
Introduction to Database Management System Administration & Security
Leadership Skills
Management Skills
Managing Employment, Hiring & Firing
MSIA Review Course -- FUNNY (2006)
Organizational Psychology
Physical & Facilities Security
Solving Problems
Working with Vendors

* * * DESCRIPTIONS * * *

Applying Social & Organizational Psychology

  • Social Dynamics of Your Group
    • How are Your Colleagues Organized?
    • What Kinds of Jobs Do Your Colleagues Do?
    • How Much Autonomy Do Your Colleagues Have?
    • Locus of Control
    • Understand Your Colleagues’ Goals
  • Applying Some Fundamental Concepts from Social Psychology
    • Attribution Theory
    • Social Cognition
    • The Schema
    • Judgement
    • Beliefs and Attitudes
    • Prejudice
    • Conformity, Compliance and Obedience
    • Pro-Social (Helpful) Behavior
    • Group Behavior
    • Social Loafing
    • Group Polarization
    • Groupthink
  • Personality Types and Social Styles

* * *

Applied Ethics

  • Ethics in Computing
  • What is Ethics
  • Why Do We Care about Ethics?
  • What’s Special about Computers?
  • Steps to Ethical Decision-Making
  • The Law and Ethics
  • Guidelines
  • Ethical Principles
  • Deontology (Rights & Duties)
  • Professional Duties
  • Relation Between Rights and Duties
  • Consequentialism
  • Kant’s Categorical Imperatives
  • Stakeholders
  • Beware Disjunction of Costs and
    Benefits

Auditing Information Security

  • Introduction to Auditing
  • EDP System Controls
  • Responsibility for Control of EDP
  • Auditing Computer Applications
  • Reporting Audit Results

E-mail and Internet Use Policies

  • Damaging the Reputation of the Enterprise
  • Disseminating and Using Incorrect Information
  • Hoaxes
  • Threats
  • Viruses and Other Malicious Code
  • Junk E-mail
  • Chain Letters and Ponzi Schemes
  • Get-Rich-Quick Schemes
  • Mail Storms
  • Stolen Intellectual Property
  • Plagiarism
  • Criminal Hacking and Hacktivism
  • Online Auctions
  • Online Gambling
  • Buying on the Web
  • Games
  • Spyware
  • Internet Addiction
  • Online Dating and Cybersex
  • Hate Groups
  • Pornography
  • Pedophiles

* * *

Identification & Authentication

  • Identification and authentication basics
  • Forms of authentication
  • Passwords
  • Tokens
  • Biometrics
  • Artificial intelligence

* * *

INFOSEC UPDATE 2006 lecture notes

This workbook was used in the two-day workshop held at the MSIA Residency in June 2006 . The PDF file includes selected abstracts covering the previous 18 months of development across the field of information assurance. For complete listings of all abstracts in the INFOSEC YEAR IN REVIEW Database, see the IYIR section of this Web site.

* * *

Introduction to Cryptology

  • Basic Concepts & Terminology
  • Types of Algorithm
  • Cryptanalysis Methods
  • Stronger Encryption
  • Asymmetric Encryption & the Public-Key Cryptosystem
  • Using PGP

* * *

Introduction to Cyberlaw:

S1 W07: Introduction to cyberlaw and jurisdiction

  • What is Cyberspace?
  • Jurisdiction in Cyberspace
  • Contracts
  • Defamation
  • Key Cybercrime Laws in the USA

S1 W08: Intellectural-property law

  • Purpose
  • Subject Matter
  • What is Protected by Copyright?
  • Formalities
  • Works Made for Hire
  • Contractual Sale
  • Infringement
  • HTML
  • Linking
  • Framing
  • Scumware
  • E-mail
  • Criminal Law
  • 1st Amendment?
  • Fair Use

 Intellectual-property law review 2010      PDF notes

  • General IP Overview
  • Patents
  • Trade Secrets
  • Copyright
  • Discussion
  • The Future of IP

Legal Aspects of Investigating & Prosecuting Computer Crimes      PDF notes

  • Introduction
  • Search Warrants
  • Warrantless Seizure of Evidence
  • Electronic Crime Scene Investigation
  • Analysis of Digital Evidence
  • Using Seized Materisla & Results in Evidence

* * *

Introduction to Database Management System Administration & Security

  • Part 1: Overview of Database Theory
    • Why study DBMS?
    • Historical Overview
    • DBMS Basics
    • Relational DB Theory
    • Fundamental Issues in DB Applications
  • Part 2: Administration & Concurrency Control
    • Database Administration
      • Configuration Control
      • Documentation
    • Concurrency Control
      • Atomic Transactions
      • Resource Locking
      • Consistent Transactions
      • Transaction Isolation Level
      • Cursor Type
  • Part 3: ACID Transactions
    • Atomic
    • Consistent
    • Isolated
    • Durable
  • Part 4: DB Security & Resource Management
    • Database Security
      • Processing Rights
      • I&A
      • Individuals & User Groups
      • Application Security
    • Database Recovery
      • Transactions
      • Application Logging
      • Transactions and Log Files
      • Backups & Log Files
      • Recovery from Backups
      • Recovery from Log Files
    • Resource Management
      • Performance
      • Inflection points
      • Capacity Planning
      • Statistical Projections
      • Packing Records by Key
      • Application Evolution

* * *

Leadership Skills Lecture

  • Leading Meetings – the Infrastructure
  • Ground Rules for Meetings
  • Presenting Information Effectively
  • Analytical Techniques

* * *

Management Skills Lecture

  • Part 1 – Understanding Management Styles
    • Hawthorne Effect
    • Implications of the Hawthorne Effect
    • Theory X: Stick & Carrot
    • Theory Y (Douglas McGregor)
    • Theory Z (Abraham Maslow)
    • Maslow’s Hierarchy of Needs
    • Managerial Styles
  • Part 2 – Good Management Style
    • Involved
    • Available
    • Open
    • Supportive
    • Fair
    • Competent
    • Confident
    • Consistent
    • Realistic
    • Organized
    • Decisive
  • Part 3 – Creating and Maintaining a Good Team
    • MBO - Management by Objectives
    • MBWA - Management by Walking Around
    • Walk a Mile in Your Employees' Shoes
    • Hire the Best People You Can Find
    • Employee Career Development
    • What About Losing a Well-Trained Employee?
    • How Can We Keep Good Employees?
    • Technical Training
    • The Redundancy Rule

* * *

MSIA Review Course -- FUNNY (2006)

Series of jokes presented at a graduation ceremony for MSIA students

* * *

Managing Employment, Hiring & Firing

  • What’s the Problem?
  • Cases
  • Hiring
  • Management
  • Termination

* * *

Physical & Facilities Security

  • Location of building
  • Location within building
  • Layout
  • Doors
  • Windows
  • Electrical power supply
  • Air conditioning
  • Electromagnetic radiation
  • Fire detection and prevention
  • Water damage
  • Guards, gates and guns
  • Access controls
  • Mechanical locks
  • Keypads
  • Features of electronic access
    control systems
  • Cards
  • Biometric methods

* * *

Solving Problems

  • Set Your Goals
  • Get the Global Picture
  • Distinguish Observation from
    Assumption
  • Distinguish Observation from
    Hearsay
  • Distinguish Observation from
    Hypothesis
  • Challenge Your Hypothesis
  • Track the Details
  • RTFM
  • Use Bug/Patch Reports

* * *

Working with Vendors

  • Vendor Relations
  • Establishing Constructive Relationships
  • Hardware Support: Vendor
  • Hardware Support: 3rd Party
  • Hardware Support: Self
  • Software Support: Vendors
  • Software Support: Clients
  • Records are Important
  • Problem-Database Design
  • Cooperative Problem Resolution
  • Problem Escalation
  • Multi-Vendor Problems

* * *

 

Copyright © 2022 M. E. Kabay.Kabay, PhD.  All rights reserved. The opinions expressed in any of the writings on this Web site represent the authorís opinions and do not necessarily represent the opinions or positions of his employers, associates, colleagues, students, relatives, friends, enemies, cats, dog or plants. Materials copyrighted by M. E. Kabay from this Website may be freely used for non-commercial teaching (i.e., specifically in any courses for academic credit or in free industry training at workshops or within organizations) but may not be re-posted on any Website or used in commercial training (where participants must pay fees for participation in the conference or workshop or where the instructor is paid) without express written permission. Any unauthorized sale of these copyrighted materials will be prosecuted to the full extent of the law.

Updated 2021-02-05