Information Security Principles


Course Description This course will describe the basic principles of information systems security, including cryptography, identifications and authentications, access control models and mechanisms, multilevel database security,  steganography,  Internet security, and planning and administering security.  The students will gain an understanding of the threats to information resources and learn about counter measurements and their limitations. 

Text Books
1.      Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing (4th Edition) (Hardcover), Prentice Hall PTR; 4 edition (October 23, 2006), ISBN-10: 0132390779 Download PPT Lecture Notes
Lecture 1:       Basic Security Concepts 1. (slides)
                                                Syllabus
                                                Project Information
Lecture 2:       Basic Security Concepts 2. (slides)
Lecture 3:       Brief discussion of research project
                       Cryptography 1. (slides)
                                                Homework 1 -- DUE Sept. 8.
Lecture 4:       Students’ brief discussions on class projects
Cryptography 2. (slides)
Lecture 5:       AES and Secret Key Distribution (slides)
Lecture 6:       Public Key Encryption (slides)
Lecture 7:       Public Key Encryption (slides)
Lecture 8:       Hash Functions and Cryptographic Protocols Analysis (slides)
Lecture 9:       Cryptographic Protocol Analysis (slides)
Lecture 10:     REVIEW TEST 1 (slides)
Lecture 11:     Sample security protocol questions
                     Software Security and Risk Management (slides)
                     Best practices (slides)             
Lecture 12:     Continue with Software Security from Lecture 11
Lecture 13:     Malicious Code (slides)
                      Identification and Authentication (slides)
Lecture 14:     Identification and Authentication (slides)
Lecture 15:     Guest lecture: Steve Lariviere – SPAWAR
P. Dodds, Cybersecurity may be winner despite Britain's cuts, AP, Oct. 18, 2010,  http://news.yahoo.com/s/ap/20101018/ap_on_re_eu/eu_britain_terrorism
                                                Lecture Notes
Lecture 16:     Test 1 Review 
Lecture 17:     Access Control (slides)
                         Access Control – MAC (slides)
Lecture 18:     Access Control – RBAC(slides)
                                                Homework 2 – Due: Nov. 3
Lecture 19:     Current Research on Access Control models and Policy Languages (slides)
Lecture 20:     Database Security (slides)
Inference Problem & Privacy Preserving Data Mining (slides)
Lecture 21:     Inference Problem & Privacy Preserving Data Mining (slides)
Test 2 Review (slides)
Lecture 22:     Network Security – Firewalls (slides), Intrusion Detection (slides)
Content: All reading materials and lectures notes from Lecture 11 (Software Security and Risk Management) to Lecture 21 (Secure Operating Systems). 
Lecture 23:     Building Secure Systems (slides)
                                                Economics of Cyber Security (slides)
Lecture 24:     Ethics (slides)
                                                Homework 3 – Due: Dec. 1
Lecture 25:     STUDENT PRESENTATIONS 
1.  Android Application Security – Group of: Biggers, Miller, Kit (slides)
2.Social Networking – Group of: Brothers, Wright  (slides)
3. Facebook Security – Group of: Carter, McKinney (slides)
4.Security in Massively Multiplayer Gaming – Groups of: Doe, Lemaster, Sprott  (slides)
5.The Security of RFIDs – Group of: Aaron, Dyer, Greene, Spivey (slides)
6.CROSS DOMAIN WEB SERVICE TRANSACTION CORRECTNESS – Group of: Olmsted  (slides)
Lecture 26:     STUDENT PRESENTATIONS
7.Using your Office from Inside and Outside – Group of Almadhor, Dia, Xu (slides)
8.Android Security Enhancement – Group of Falls, Hepburn  (slides)
9.Privacy-Preserving Distributed Data Mining – Group of Shams-Ul-Haq (slides)
10.SQL Injection Attacks – Group of Hendrichs, Shaw, Mabry (slides)
11.Security in Online-Poker – Group of Motley, Rushe, Walker, Witkoski (slides)
12.Modeling Estimated Risk for Major Cyber Attacks – Group of Parker (slides)
13.Botnets – Group of Caroll (slides)

No comments:

free counters