COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials



Similar documents
Introducing Kashef for Application Monitoring

Recognition Scheme Forensic Science Content Within Educational Programmes

Health insurance exchanges What to expect in 2014

Enterprise Risk Management Software Buyer s Guide

Application Bundles & Data Plans

JaERM Software-as-a-Solution Package

Health insurance marketplace What to expect in 2014

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

Health insurance exchanges What to expect in 2014

File Storage Guidelines Intended Usage

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Quick Reference Guide: Reset Password

Quick Reference Guide: One-time Account Update

Savvis IT Infrastructure. Savvis SaaS Infrastructure Solutions Enterprise-class Resources for SaaS Delivery

How To Find Out What A Librry Is Like

Protocol Analysis / Analysis of Software Artifacts Kevin Bierhoff

Voluntary Prekindergarten Parent Handbook

AntiSpyware Enterprise Module 8.5

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Small Business Cloud Services

Network Configuration Independence Mechanism

Prescriptive Program Rebate Application

Pathway Guide to. NYC Early Childhood.

Understanding Cloud Accounting and QuickBooks Online

Data replication in mobile computing

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2

How To Network A Smll Business

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory

Small Business Networking

Commercial Cooling Rebate Application

Welch Allyn CardioPerfect Workstation Installation Guide

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Combined Liability Insurance. Information and Communication Technology Proposal form

GENERAL APPLICATION FOR FARM CLASSIFICATION

1 of 7 31/10/ :34

Small Business Networking

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007

QUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C.

E-Commerce Comparison

Vendor Rating for Service Desk Selection

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team

STATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services

Pay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

The LENA TM Language Environment Analysis System:

Industrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

Innovative and applied research on big data platforms of smart heritage

Object Semantics Lecture 2

Corporate Compliance vs. Enterprise-Wide Risk Management

Small Business Networking

Roudmup for Los Angeles Pierce College ADIV Program ancl csu Dominguez Hilk Rlt-B^sr/ progrum

Reasoning to Solve Equations and Inequalities

STRM Log Manager Installation Guide

A National Look at the High School Counseling Office

PETER M. ROSS 22 Four Oaks Crescent London, Ontario N6J 4B7 Telephone: /Facsimile: pmross@,uwo.

THE MASSACHUSETTS DATA PROTECTION LAW

HP Application Lifecycle Management

Improving secure storage of data in Android

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

Kofax Reporting. Administrator's Guide

Health Information Systems: evaluation and performance of a Help Desk

Curriculum for the Master Program in Accounting, Auditing and Taxation at the University of Innsbruck School of Management

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A

How To Be A Successful Mobile Ppliction And Regression Tester

Blackbaud The Raiser s Edge

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

collection, dissemination and security of data. inform the access and utilisation of data within the organisation.

Small Business Networking

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -

UNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C ACTION BY: All Divisions and Offices. FGIS Directive 2510.

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Architecture and Data Flows Reference Guide

Protection of Critical Information Infrastructure in Korea


Regulatory Story. RNS Number : 8343I. DCD Media PLC. 08 July TR-1: NOTIFICATION OF MAJOR INTEREST IN SHARES i

Version X3450. Version X3510. Features. Release Note Version X3510. Product: 24online Release Number: X3510

Unleashing the Power of Cloud

Workflow Administration of Windchill 10.2

Advanced Baseline and Release Management. Ed Taekema

Treatment Spring Late Summer Fall Mean = 1.33 Mean = 4.88 Mean = 3.

In addition, the following elements form an integral part of the Agency strike prevention plan:

Transcription:

COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development, nd federl regultions nd complince. Emphsis is on security professionl certifiction. Course Objectives To develop n understnding of bsic computer security terminologies nd concepts. To understnd the prcticl relities of computer security through hnds-on cse studies. To understnd the concepts of security design principles. To fmilirize nd understnd current federl regultions nd complince issues pertining to computer security nd privcy. To understnd the concepts of bsic cryptogrphy nd ccess control. Course Mterils Textbook Softwre Title: Introduction to Computer Security Author: Mtt Bishop Publisher: Person Eduction/Addison Wesley Dte: 2005 NMp Nessus NetStumbler WinHex Wireshrk NetBens 6 Jv Softwre Development Kit Supplementry Resources

Informtion Security by Mrk Stmp. John Wiley nd Sons, 2006. notes, project descriptions, homework problems, nd frequently sked questions (FAQ) bout the course mterils re freely ccessible through JSU's Blckbord system. Detiled Course Outline Topic I Overview of Computer Security 1.5 Confidentility b Integrity c Avilbility d Threts e Assurnce f Risk Anlysis nd Benefits II Access Control Mtrix Protection Sttes III Security Policies 2 Trust b Types of Security Policies c Access Controls 1 IV Confidentility Policies Bell-LPdul model b Exmples V Integrity Policies 1 Bib model b Clrk-Wilson model c Exmples VI Hybrid Policies 1 Chinese Wll model b Clinicl informtion systems security c ORCON d RBAC VII Bsic Cryptogrphy 4 Clssicl systems 1 b Public Key cryptogrphy 1 c c Cryptogrphic checksums Comprison of techniques: RSA, DES, MD5, SHA, 3DES, RC4, 1 1

Topic nd AES fetures nd strengths VIII Key Mngement 1.5 Session nd Interchnge keys b Key exchnge c Storing nd revoction d Digitl signtures IX Authentiction 1.5 Psswords b Chllenge Response c Biometrics d Loction X Design Principles 2 Lest privilege b Fil-sfe defults c Economy of mechnisms d Complete medition e Open design f Seprtion of privilege g h Lest common mechnism Psychologicl cceptbility XI Access Control 2.5 Cretion nd Mintennce b Cpbilities c Locks nd keys d Ring-bse ccess control e Propgted ccess control XII Auditing 1.5 Logging, nlyzing, notifying b Auditing mechnisms c Auditing file systems XIII Intrusion Detection, Penetrtion Testing, nd Vulnerbility Anlysis Models: nomly, misuses, specifiction 3.5 b Intrusion response c Intrusion hndling d Flw hypothesis, generliztion, nd testing e Informtion gthering

Topic f Vulnerbility clssifiction g Frmeworks XIV Network nd Physicl Security 2.5 Orgniztion b Policy development c Firewlls nd proxies d Lyered security e Physicl Security XV System Security 3 Networks b Users c Authentiction d Processes e Files f Devices: USB drives, Fx, Videocms g Zone of control h XVI Dtbses, Dtwrehouses, Dt mining Secure Appliction nd System Development Requirements nd Policy b Design c d e Refinement nd Implementtion Common securityrelted ppliction development problems Testing, vlidtion, verifiction, mintennce, nd opertion 3 XVII Web Security 2 SQL Injection b Buffer Overflow c Cross site scripting d Web services security XVIII Evluting Systems 3.5 Forml evlution b TCSEC/ITSEC 1 c FIPS140 d Common Criteri 1 e SSE-CCM XIX Security Certifiction 1 CISSP certifiction 0.75 1

Topic b Smple test questions Course Policy Grding Policy Test 1 25% Test 2 25% Reserch Pper 10% Cse Studies/HW/Projects 15% Finl Exm 25% Grding scle (Percentge) A 90 - bove B 80-89 C 70-79 D 60-69 F below 60 Mke-up Exms To tke mke-up exm, student must hve legitimte reson for hving missed the exm. No student, regrdless of the reson, my tke more thn two mke-up exms. It is the responsibility of the student to request mke-up exm. No mke-up will be given on ny missed pop test. Be prepred to tke the mkeup exm s soon s you return to clss. Lte Assignments All homework ssignments re to be turned in t midnight on the due dte. Lte homework will be chrged 10% deduction per dy. Other Course Policies Any individul who qulifies for resonble ccommodtions under the Americns With Disbilities Act or Section 504 of the Rehbilittion Act of 1973 should contct the Instructor immeditely. Course Syllbus The syllbus for this course cn be downloded here in PDF formt.

2008 Jcksonville Stte University