X hits on this document

PDF document

SRA111: Introduction to Security and Risk Analysis - page 12 / 15

64 views

0 shares

0 downloads

0 comments

12 / 15

Use the following advice to receive maximum learning benefits from your participation in this course:

DO

DON’T

§ Do take a proactive learning approach § Do share your thoughts on critical issues and potential

§ Don’t assume there is only one correct answer to a question § Don’t be afraid to share your perspective on the issues

problem solutions § Do plan your course work in advance § Do explore a variety of learning resources in addition to the

textbook § Do offer relevant examples from your experience § Do make an effort to understand different points of view § Do connect concepts explored in this course to real-life

analyzed in the course § Don’t be negative towards points of view that are different

from yours § Don’t underestimate the impact of collaboration on your

learning § Don’t limit your course experience to reading the textbook § Don’t postpone your work on the course deliverables –

professional situations and your own experiences

work on small assignment components every day

Appendix A: Reading List

Module 1: Motivation

CSI/FBI Computer Crime and Security 2004 Survey. (M1-1) http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf Michael E. Whitman, “Enemy at the Gate: Threats to Information Security,” Communications of the ACM, Vol. 46, No. 8, August

2003, pp. 91-95. (M1-2) The National Strategy to Secure Cyberspace, The Whitehouse, US, February 2003. (M1-3)

http://www.whitehouse.gov/pcipb/cyberspace_strategy.pdf Critical Infrastructure Protection: Challenges and Efforts to Secure Systems

, GAO-04-354, March 15, 2004. (M1-4)

http://www.gao.gov/new.items/d04354.pdf

Module 2: Basic Concepts of Information Security

12

Document info
Document views64
Page views65
Page last viewedThu Dec 08 00:27:04 UTC 2016
Pages15
Paragraphs335
Words2813

Comments