Πανεπιστήμιο Θεσσαλίας Τμήμα Πληροφορικής Παρουσίαση Εργασιών
Χρονοδιάγραμμα Μαθήματος Διαλέξεις 16 Δεκεμβρίου 2017 Εργασίες Εισαγωγή στην Διαχείριση Συμβάντων 1/2 13 Ιαν 2018 Εισαγωγή στην Διαχείριση Συμβάντων 2/2 Quest presentation (Expert in incident investigations from Fintec) 20 Ιαν 2018 Computer Forensics 27 Ιαν 2018 Malware 9/17/2018 Παν. Θεσσαλίας
Research Paper – Teams at most of 3 students (100% of the grade) Incident response team -- select a fictitious critical infrastructure sector company and create a senior executive (CISO/CIO) level report, with accompanying executive briefing, highlighting why your company needs an internal CIRT/CERT team. At a minimum cover what will happen when your company is hit with malicious software, or a breach, describing a potential Company incident in great detail. Include how your recommended CIRT/CERT team will approach/engage, processes they will use, tools (software and hardware) that you expect them to have/use, timing and potential business impacts, estimated incident costs (to include potential CIRT/CERT team set-up), team skills needed with estimated costs, the [critical] reporting processes and how the CIRT/CERT team will be organized. The length of the report should be less than 20 pages. (One page is a single side of paper) On a separate attachment include your open source references. A executive presentation will be also delivered with the assignment. 9/17/2018 Παν. Θεσσαλίας
Research Paper – Teams at most of 3 students (100% of the grade) Select a recent cyber event - research the event using open source references - then write an executive-level technical brief on the event. Include the following as a minimum: threat vector used, vulnerability, incident response actions taken, your recommended mitigations, business impact of this event. The length of this paper should be one page - maximum of two pages. (One page is a single side of paper) On a separate page include your open source references minimum of two (2) unique sources are required. 9/17/2018 Παν. Θεσσαλίας
malware detection in iot incident handling in iot networks Research Paper – Individuals or Teams at most of 2 students (100% of the grade) Scope: deep literature search kai deep State-of-the-art analysis (maximum 2 per topic). Topics: malware detection in iot incident handling in iot networks Data security techniques in iot networks intrusion detection in IoT Forensics in IoT Auditing in IoT 9/17/2018 Παν. Θεσσαλίας
Key questions to be answered: Research Paper – Individuals or Teams at most of 2 students (100% of the grade) Scope: State of the art analysis of the impact of Artificial Intelligence to the Incident handling cycle Key questions to be answered: How AI is used in cyber security (defence and offence) What is the state-of-the-art in this field Are there any prominent algorithms, techniques, tools, frameworks Which are the use cases that AI is used in incident handling 9/17/2018 Παν. Θεσσαλίας
Machine Learning in Cybersecurity Key questions to be answered: Research Paper – Individuals or Teams at most of 2 students (100% of the grade) Scope: Machine Learning in Cybersecurity Key questions to be answered: How ML is used in cyber security (defence and offence) What is the state-of-the-art in this field Are there any prominent algorithms, techniques, tools, frameworks Which are the use cases that ML is used in incident handling 9/17/2018 Παν. Θεσσαλίας
Key questions to be answered: Research Paper – Individuals or Teams at most of 2 students (100% of the grade) Title: Digital Forensics Key questions to be answered: What is the state-of-the-art in this field Are there any prominent algorithms, techniques, tools, frameworks Which are the categories of digital forensics. Provide an example in one case: Computer forensics. Mobile device forensics. Network forensics. Forensic data analysis. Database forensics. 9/17/2018 Παν. Θεσσαλίας
Διαδικασία ανάθεσης Μέχρι 23/12 δήλωση των ομάδων - οριστικοποίηση των αναθέσεων Παρουσίασεις εργασιες παράδοση μέχρι 27.01.