TOPIC OUTLINE ver. 6-1-2001

CECS 694

Information Security

Secure Computing, Trusted Systems & Privacy
University of Louisville
Summer 2001

May 14-July 18, 2001
Topic Outline/Class Schedule


Note:  This schedule is subject to change during the semester. 
 
Assignments for the Information Security Laboratory under Keith Stevenson's direction are in addition to the schedule set forth below; these entail, generally, securing your system, detection of system compromise and recovery from system compromise.

 

Date

Topic

Resources

Also see online reading list for CECS 311 which is updated during the semester.

1a 5-14

 

Introduction to Class/
Review Course Plans

Legal and Ethical Concerns

Laws relating to Computer, Network and Data Access

inter alia, Computer Fraud & Abuse Act: 18 USCS § 1030,Electronic Communications Privacy Act: 18 USCS § 2510--2521 and § 2701 --2721, Digital Millennium Copyright Act

ACM Code of Ethics; Center for the Study of Ethics in the Professions (Illinois Institute of Technology)

1b 5-16

 

Legal & Ethical Information Practices

Toxen, Ch. 21

Special Agents James Harris and  Greg Johnson, Federal Bureau of Investigation (USA)

2a 5-21

 

OS Security Models

Stallings, Ch. 1

Toxen, Ch. 1

Keith Stevenson

2b 5-23

 

Encryption Stallings, Chapters 2 & 3

Prof. Desoky

  Submission of paper topic due
Submission of team project topic due
 
3a 5-28 Memorial Day
3b 5-30 Practical Security Toxen, Ch. 2 & 3

Stevenson

4a 6-4 Security Theory Toxen, Ch. 10

Case Studies

4b 6-6  IP Security

Stallings, Chapters 6 & 8

Toxen, Ch. 5 & 5

HIPPA regulations

Scott Moore

5a 6-11 E-Mail Security Stallings, Chapter 5 & 10

Prof. Adel Elmaghraby

  Outline of paper topic and Peer Review of Outline Submit to Professors Losavio & Ragade
5b 6-13 Secure Protocols Panel
6a 6-18 Firewalls Stallings, Ch. 5 & 10

Stevenson

6b 6-20 Intrusion Detection

 

Stallings, Chapter 9

Toxen, Ch. 15, 16 & 17

Essam

7a 6-25 Worms & Virii Stallings, Ch. 9
7b 6-27  Web Security, Java & Active X Stallings, Ch. 7
  Draft of paper due - 1 hard copy at beginning of class, 1 electronic copy emailed to both Professors Ragade and Losavio

Peer Review of draft paper

Draft to be minimum 8 pages, 12 point Times Roman font, double spaced, 1" margins on 81/2"x11" white unglazed paper; copious citations as footnotes required.
8a 7-2 Recovery From Compromise Toxen, Ch. 18, 19 & 20

Stevenson

  Outline of planned presentation due Submit to Professors Losavio & Ragade 
8b 7-4 Independence Day
9a 7-9 Review of Secure Computing & Administrative Practices Toxen, Ch. 2 & 7

Ron Moore

9b 7-11 Security Policy and Users Alice Rademacher
  Student papers due-Maximum of 3 pages,12 point Times Roman font, double spaced, 1" margins on 81/2"x11" white unglazed paper; relevant citations as footnotes required.  (Turn in at beginning of class)
7-16 

Ragade & Losavio

Class Presentations

Groups 1 & 3

Approximately ½ hour presentations with class analysis, critique and questions

 7-18

Ragade & Losavio

Class Presentations

Groups 2 & 4

Approximately ½ hour presentations with class analysis, critique and questions

Key for Readings in Schedule:

 Required Texts
Stallings, William Network Security Essentials: Applications and Standards
Toxen, Bob Real World Linux Security: Intrusion Prevention, Detection & Recovery, 1e

Supplemental Reading as assigned

© 2001 Rammohan K. Ragade & Michael M. Losavio
Use for non profit educational purposes is granted provided source is credited.

Last Revised: June 09, 2001