IBCS2 - 1314 - February

From WLCS

Friday (2/28/14)

  • Paid Focus Group Opportunity
    • MediaBarn is having a focus group study at 5:30pm on Tuesday (3/4/14). They are interested to talk with students who are interested in majoring in IT/Computer Science/any related topic.
    • 90-minute focus group, and the compensation is $100
    • Registration Here
    • Mediabarn Research Services (near Courthouse metro), 2200 Clarendon Blvd, Suite 1200, Arlington, VA 22201

Friday - Thursday (2/21/14 - 2/27/14)

Agenda:

  • Internal Assessment - What's Left?
  • Appendix
    • Evidence of consultation with the client/advisor (transcription of consultation works)
    • Evidence of feedback from the client/advisor (transcription of feedback is ok)
    • Any additional documents or screenshots of the product functioning
  • Super-checklist rubric for all criteria
  • 2000 word max for the extended writing sections
  • Use of the provided Media:IBCS_IA_Forms.zip and templates
  • All written sections are saved as .rtf (RichTextFormat) or .odt (OpenDocument) files
  • Correct location and placement of the following:
    • Criteria A-E documentation should be located in the Documentation folder
    • Your video should be located in the Documentation folder as Criterion D
    • Your actual product should be located in the Product folder. The product should work as it sits in the folder.
    • Cover page
  • Filling out the cover page
    • Use relative links
    • Make sure you fill in every field
    • Link to a working copy of your product
  • Burn everything onto a CD

FINAL DEADLINE:

  • Monday, March 3rd, 2014

Wednesday (2/19/14)

Warmup:

  1. For each section, write at least one specific concerns or possible attack strategy
    1. Company website page on DoS attacks
    2. Guanjong High School
    3. Western Heights
    4. BYOD (Bring Your Own Device)
  2. We will use the entire's class list of attacks to test out each team's security plan

Agenda:

  • Network Security Plan Presentations
    1. Each team will present their plan
    2. We will test each plan by going over the class's list of attacks

Friday (2/14/14)

  • Snow Day

Monday - Wednesday (2/10/14 - 2/12/14)

Warmup:

  • Be sure that you have read the Case Study: Network Security - Media:IBCS_CaseStudy2014.pdf
    1. Begin preparing a Google document that has 4 sections:
      1. Company website page on DoS attacks
      2. Guanjong High School
      3. Western Heights
      4. BYOD (Bring Your Own Device)
    2. For each section, write at least one specific concerns or possible attack strategy
    3. We will use the entire's class list of attacks to test out each team's security plan

Agenda:

Thursday (2/6/14)

Agenda:

  • Criterion E: Evaluation - Due Monday (2/10/14)
  • This criterion should be completed as two parts (headings)
  • Evaluation of the product (you should be able to do some of this by Monday)
    • The evaluation of the product should refer directly to the success criteria in Criterion A, feedback from the client/adviser, as well as any other appropriate feedback obtained.
    • You should basically demo your product to multiple people and have them comment on each success criteria
  • Recommendations for the future development of the product (you should be able to do this by Monday)
    • The student will use the feedback and the evaluation of the specific performance criteria to recommend possible future developments to the product. These recommendations should explain the benefits of these developments.
    • You should basically ask in your feedback, suggestions for extending or enhancing the project. Explain why each new development would be good.
    • You should have at least 2 minor improvements and 2 major improvements
  • Case Study: Network Security - Media:IBCS_CaseStudy2014.pdf
    1. Highlight any/all special terms in your reading
    2. As you read, look up any terms that you do not understand or if you need more information
    3. We will break up into groups next week to simulate network security teams. Each team will address one of the scenarios in the Challenges Faced section at the end of Media:IBCS_CaseStudy2014.pdf
    4. Begin preparing a Google document that has 4 sections:
      1. Company website DoS attacks
      2. Guanjong High School
      3. Western Heights
      4. BYOD (Bring Your Own Device)
    5. For each section, list a bulleted description of 3 different concerns/possible attacks
  • Crash Course in Symmetric and Asymmetric Cryptography

Tuesday (2/4/14)

Agenda: