Mapping Injections to CAE IA/CD Knowledge Units

 

  Modules
Cyber Defense
Students will be able to describe potential system attacks and the actors that might perform them. CS2 Buffer Overflow
CL Phishing
Students will be able to describe cyber defense tools, methods and components. CS2 Input Validation
CL Passwords
CL Encryption
Students will be able to apply cyber defense methods to prepare a system to repel attacks. CL Encryption
Students will be able to describe appropriate measures to be taken should a system compromise occur.  
 
Cyber Threats
Students will be able to identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations, aversion to risk.  
Students will be able to describe different types of attacks and their characteristics. CS2 Buffer Overflow
CL Phishing
 
Fundamental Security Design Principles
Students will be able to list the first principles of security.  
Students will be able to describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies. CS2 Encapsulation
Students will be able to analyze common security failures and identify specific design principles that have been violated.  
Given a specific scenario, students will be able to identify the needed design principle.  
Students will be able to describe why good human machine interfaces are important to system use. CS2 Input Validation
Students will understand the interaction between security and system usability and the importance for minimizing the affects of security mechanisms  
 
Information Assurance Fundamentals
Students shall be able to list the fundamental concepts of the Information Assurance / Cyber Defense discipline. CL Social Networking Security
Students will be able to describe how the fundamental concepts of cyber defense can be used to provide system security.  
Students will be able to examine the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.  
 
Intro to Cryptography
Students will be able to identify the elements of a cryptographic system.  
Students will be able to describe the differences between symmetric and asymmetric algorithms. CL Encryption
Students will be able to describe which cryptographic protocols, tools and techniques are appropriate for a given situation.  
Students will be able to describe how cryptography can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g., key management), etc. CL Encryption
 
Data Administration
Students will be able to identify relevant security issues given a system and data management structure CS2 Integer Error
CS2 Input Validation
CS2 Buffer Overflow
 
Data Structures
Students will be able to list the most common structures and data formats for storing data in a computer system.  
Students will be able to discuss the advantages and disadvantages of different data structures/formats. CS2 Buffer Overflow
 
Fraud Prevention and Management
Students will be able to describe the components of the fraud triangle – necessary condition for fraud  
Students will be able to describe the cost and effectiveness of common fraud detection and prevention methods. CL Phishing
Students will be able to analyze record keeping and management procedures for assets and to identify/correct weaknesses.  
Students will be able to describe legal and ethical requirements for detecting, preventing and reporting fraud.  
Students will be able to describe investigative procedures for fraud.  
Students will be able to describe common methods of financial statement fraud.  
 
Life-Cycle Security
Students will be able to analyze a security failure and identify how decisions in other phases of the system life-cycle influenced the eventual failure.  
Students will be able to list and describe the phases of the system life-cycle. CS0 Software Development Lifecycle
Students will be able to list and describe the elements of a maturity model.  
 
Secure Programming Practices
Students will be able to produce software components that satisfy their functional requirements without introducing vulnerabilities CS2 Integer Error
CS2 Input Validation
CS2 Buffer Overflow
CS2 Encapsulation
Students will be able to describe the characteristics of secure programming. CS2 Integer Error
CS2 Input Validation
CS2 Buffer Overflow
CS2 Encapsulation
 
Software Assurance
Students will be able to describe the importance of secure software, and the programming practices and development processes and methodologies that lead to secure software. CS2 Integer Error
CS2 Input Validation
CS2 Buffer Overflow
CS2 Encapsulation
CS0 Software Development Lifecycle
 

 

Click here to see the CS 2013 map.

 
Copyright © Towson University