CSSS - Cybersecurity


2014-2015 GRADUATE STUDIES CATALOG
Effective 1 June 2014?31 May 2015

Please see the Graduate Catalog Archives for PDF versions of past catalogs.

Course Descriptions

CSSS 5000 Introduction to Cybersecurity (3)

This requisite course is designed to provide the student an overview of the major core areas of study they will encounter throughout this program. Introduction of computer system architectures, vulnerabilities, critical infrastructures, the growing threat of social networks, intelligence and counter intelligence, international laws, security policies, privacy and information liability, cyber attacks and counter cyber attacks, encryption, risk assessment, cybersecurity forensics including data gathering and recovery, and a forward look at future cyber technology developments.

CSSS 5110 Cybersecurity Communications (3)

Digital communications has grown rapidly and provides increased opportunities to: access information; share and disseminate knowledge; create new innovative services; and compete in a global environment. It presents new opportunities and a growing threat posed by a connected society that can impact critical United States interests. The basics of communication systems, the ISO Layer Model, topologies such as Local-Area-Networks (LANs), Wide-Area-Networks (WANs), World Wide Web and the Internet, space-based communications used by Department of Defense (DoD) and commercial entities, fiber-optics, as well as the rapidly developing personal mobile communication technologies such as Wireless Local Area Network (WiFi). Prerequisite: CSSS 5000

CSSS 5120 Cybersecurity Infrastructures (3)

The impact of September 11, 2001 cemented our attention on physical attacks on United States critical infrastructures. Although still a concern, a growing Cybersecurity threat requires additional focus on potential virtual attacks on these same critical infrastructures. Both physical and virtual in capacitance of a critical infrastructure such as the Power Grid, Communications, and Financial transactions can have as great, or greater, impact on our society, Cyber attacks have and can cripple an industry and the services they provide to millions of users. The critical infrastructures identified by the Department of Homeland Security (DHS) are examined from a Cybersecurity perspective. Prerequisite: CSSS 5000

CSSS 5130 Cybersecurity Intelligence/Counter-Intelligence (3)

Students examine methods, ethics, policies and procedures for accessing and gathering information for positive or negative use, and applying counterintelligence to evade, trick or trap individuals, agencies, or national entities who wish to steal, damage or deny access to valid users of critical information and its sources. Active measures, passive counter measures, and intelligence gathering processes as well as determining the validity and success of gathering information will be included. Prerequisite: CSSS 5000

CSSS 5140 Cybersecurity Strategic Operations (3)

Specific methods, ethics, laws, policies and procedures for conducting strategic operations and countermeasures are the focus of this course. Students will learn how to identify critical infrastructures, communication channels, and information protection schemes and how to detect threats, assess vulnerabilities, penetrate and exploit cyber targets, understand how to monitor, spoof, redirect and deny access, as well as protect critical assets. Prerequisite: CSSS 5000

CSSS 5210 Cybersecurity Law and Policy (3)

The laws and policies dealing with cyber-crime, cyber warfare, privacy and international perspectives as well as an in depth look at the National Security Act, the United States Cybersecurity Electronic Security Act, the Cyber Security Enhancement Act, the Protecting Cybersecurity as a National Asset Act, the Communications Assistance for Law Enforcement Act (CALEA), cyber-crime laws, international cyber-crime laws and other current laws and policies will be reviewed and discussed. Prerequisite: CSSS 5000

CSSS 5220 Cybersecurity Threat Detection (3)

Students will examine various methods used to threaten our Cyber systems such as: viruses; spoofing; denial of service; fraud; theft; phishing; spy bots; spam; Trojan horses; email and active malware attachments; viral applications; hardware (computers and portable storage devices) with built in viruses or trap-doors; fake web sites; as well as eaves dropping via wireless networks; criminal access to national, corporate or personal data; and the growing loss of privacy over social networks. Prerequisite: CSSS 5000

CSSS 5230 Cybersecurity Forensics (3)

The course covers methods and procedures for identification and recovery of damaged or erased digital data, tracing information access (web history, cookies, cache memory and internet source identification), determination of system vulnerabilities (e.g., TEMPEST), communication ports and computer system architectures and encryption methods, as well as incident monitoring and response. Prerequisite: CSSS 5000

CSSS 5240 Pre-Emptive Deterrence (3)

This course addresses specific methods, ethics, laws, policies and procedures for planning and executing pre-emptive Cybersecurity deterrence operations and force application. Prerequisite: CSSS 5000

CSSS 5250 Use and Protection of Space Assets (3)

A unique course, it focuses on all three segments (space, ground and user) of fixed and mobile communication and Global Positioning System (GPS) assets and their attributes. Secure and non-secure systems are examined to show the breadth of capabilities along with the pros and cons. Uplink and downlink signal characteristics, signal bouncing and relaying capabilities. Frequency hopping, spread-spectrum, interception and overpowering of signals through use of steerable beams, application of laser and fiber-optics, and encryption techniques are cover. Prerequisite: CSSS 5000

CSSS 5260 Encryption/Decryption Methods and Techniques (3)

The history and application of ciphers, codes and encryption/ decryption methods and techniques are examined in detail. Public and Private keys and other advanced methods will be included. Understanding the overhead of encryption on communications systems and the storage of data as well as methods employed for decryption, verification and authentication. Aspects of ethics and information privacy have a role when security is applied to public systems and email content as well as higher levels of security for corporations proprietary and government classified information; additionally, the Data Protection Act will be discussed. Prerequisite: CSSS 5000

CSSS 5990 Advanced Topics in Cybersecurity (3)

This course is designed to permit addressing advanced and emerging topics in Cybersecurity that may include, but not be limited to, Cybersecurity communications, cyber warfare planning and execution, forensics, ethics, policies and laws, encryption/ decryption and future topics e.g., application of quantum non-locality. This course may be repeated for credit if the content differs. Prerequisite: CSSS 5000

CSSS 6001 Practical Research in Cybersecurity I (3)

The student is expected to synthesize and integrate the learning experiences acquired throughout the MS in Cybersecurity and to evaluate current and future topics relative to this major. Specific papers, projects, or other methodologies must include Cybersecurity related technical and management areas than span this entire degree emphasis. Internships or practical research projects that span two consecutive semesters are considered appropriate applications of student research in conjunction with the completion of this course. Prerequisite: Successful completion of all required core courses in this major

CSSS 6002 Practical Research in Cybersecurity II (3)

The student is expected to synthesize and integrate the learning experiences acquired throughout the MS in Cybersecurity and to evaluate current and future topics relative to this major. Specific papers, projects, or other methodologies must include Cybersecurity related technical and management areas than span this entire degree emphasis. Internships or practical research projects that span two consecutive semesters are considered appropriate applications of student research in conjunction with the completion of this course. Prerequisite: Successful completion of CSSS 6001