|
CECS 694 Information Security Secure Computing, Trusted Systems
& Privacy May
14-July 18, 2001 |
| Note: This schedule is subject to change during the semester. |
| Assignments for the Information Security Laboratory under Keith Stevenson's direction are in addition to the schedule set forth below; these entail, generally, securing your system, detection of system compromise and recovery from system compromise. |
|
Date |
Topic |
Resources Also see online reading list for CECS 311 which is updated during the semester. |
|
1a 5-14
|
Introduction to Class/ Legal and Ethical Concerns Laws relating to Computer, Network and Data Access |
inter alia, Computer Fraud & Abuse Act: 18 USCS § 1030,Electronic Communications Privacy Act: 18 USCS § 2510--2521
and § 2701 --2721, ACM Code of Ethics; Center for the Study of Ethics in the Professions (Illinois Institute of Technology) |
|
1b 5-16
|
Legal & Ethical Information Practices |
Toxen, Ch. 21 Special Agents James Harris and Greg Johnson, Federal Bureau of Investigation (USA) |
|
2a 5-21
|
OS Security Models |
Stallings, Ch. 1 Toxen, Ch. 1 Keith Stevenson |
|
2b 5-23
|
Encryption |
Stallings, Chapters 2 & 3
Prof. Desoky |
|
Submission of paper topic due Submission of team project topic due |
||
| 3a 5-28 | Memorial Day | |
| 3b 5-30 | Practical Security |
Toxen, Ch. 2 & 3
Stevenson |
| 4a 6-4 | Security Theory |
Toxen, Ch. 10
Case Studies |
| 4b 6-6 | IP Security |
Stallings, Chapters 6 & 8 Toxen, Ch. 5 & 5 HIPPA regulations Scott Moore |
| 5a 6-11 | E-Mail Security |
Stallings, Chapter 5 & 10
Prof. Adel Elmaghraby |
| Outline of paper topic and Peer Review of Outline | Submit to Professors Losavio & Ragade | |
| 5b 6-13 | Secure Protocols | Panel |
| 6a 6-18 | Firewalls |
Stallings, Ch. 5 & 10
Stevenson |
| 6b 6-20 |
Intrusion Detection
|
Stallings, Chapter 9
Toxen, Ch. 15, 16 & 17 Essam |
| 7a 6-25 | Worms & Virii | Stallings, Ch. 9 |
| 7b 6-27 | Web Security, Java & Active X | Stallings, Ch. 7 |
|
Draft of paper due - 1 hard copy at beginning of class, 1 electronic copy
emailed to both Professors Ragade and Losavio
Peer Review of draft paper |
Draft to be minimum 8 pages, 12 point Times Roman font, double spaced, 1" margins on 81/2"x11" white unglazed paper; copious citations as footnotes required. | |
| 8a 7-2 | Recovery From Compromise |
Toxen, Ch. 18, 19 & 20
Stevenson |
| Outline of planned presentation due | Submit to Professors Losavio & Ragade | |
| 8b 7-4 | Independence Day | |
| 9a 7-9 | Review of Secure Computing & Administrative Practices |
Toxen, Ch. 2 & 7
Ron Moore |
| 9b 7-11 | Security Policy and Users | Alice Rademacher |
| Student papers due-Maximum of 3 pages,12 point Times Roman font, double spaced, 1" margins on 81/2"x11" white unglazed paper; relevant citations as footnotes required. (Turn in at beginning of class) | ||
|
7-16
Ragade & Losavio |
Class Presentations Groups 1 & 3 |
Approximately ½ hour presentations with class analysis, critique and questions |
|
7-18
Ragade & Losavio |
Class Presentations Groups 2 & 4 |
Approximately ½ hour presentations with class analysis, critique and questions |
Key for Readings in Schedule:
| Required Texts | |
| Stallings, William | Network Security Essentials: Applications and Standards |
| Toxen, Bob | Real World Linux Security: Intrusion Prevention, Detection & Recovery, 1e |
Supplemental Reading as assigned
© 2001 Rammohan K. Ragade & Michael M.
Losavio
Use for non profit educational
purposes is granted provided source is credited.
Last Revised: June 09, 2001