Click the link of the item to go to the GitHub Page to download it for viewing or click the download button to view PDF if available
Introduction to Information Security
CIS 481 – Basic notions of confidentiality, integrity, availability, authentication models, protection models, security kernels, audit, intrusion detection, operational security issues, physical security issues, security system life cycle management, personnel security, policy formation and enforcement, trust modeling, risks and vulnerabilities assessment, basic issues of law and privacy, trade secrets, employee covenants, copyright, database protection, software and hardware validation, verification and certification.
Computer Forensics
CIS 484 – Basic computer forensics concepts involving evidence collection, preservation, and presentation in court. Technology tools to analyze files, implications on privacy, ethics, policies, risk management and legal aspects will be covered.
CIS 484 Louisville Forensics Exam – A group project which allowed us to discover and document evidence on a suspects drive using a variety of forensic tools such as FTKImager, Autopsy, Arsenal Image Mounter, $I_Parse, Registry Explorer, RegRipper, LECmd, JLECmd, PECmd, Excel for parsed data, Notepad, XML Notepad, Notepad++.
Network Security
Click on Network Security below to see a variety of works on the topic
CIS 480 – Basic concepts of networking, operations security, protocol features for security, transmission security, packet filtering, TCP wrappers, firewalls, computer viruses, physical protection, legal protection, liability issues, significance of National Security Directive 42, implications of Computer Security Act, CERT recommendations, assessment of threats and vulnerabilities of systems, security countermeasures, contingency planning, disaster recovery, risk management, and auditing and monitoring, policies and procedures dealing with storage and disposition of sensitive data.
Network Security – Basic concepts of networking, operations security, protocol features for security, transmission security, packet filtering, TCP wrappers, firewalls, computer viruses, physical protection, legal protection, liability issues, significance of National Security Directive 42, implications of Computer Security Act, CERT recommendations, assessment of threats and vulnerabilities of systems, security countermeasures, contingency planning, disaster recovery, risk management, and auditing and monitoring, policies and procedures dealing with storage and disposition of sensitive data.