CECS 694 Information Security Secure Computing, Trusted Systems
& Privacy May
14-July 18, 2001 |
Note: This schedule is subject to change during the semester. |
Assignments for the Information Security Laboratory under Keith Stevenson's direction are in addition to the schedule set forth below; these entail, generally, securing your system, detection of system compromise and recovery from system compromise. |
Date |
Topic |
Resources Also see online reading list for CECS 311 which is updated during the semester. |
1a 5-14
|
Introduction to Class/ Legal and Ethical Concerns Laws relating to Computer, Network and Data Access |
inter alia, Computer Fraud & Abuse Act: 18 USCS § 1030,Electronic Communications Privacy Act: 18 USCS § 2510--2521
and § 2701 --2721, ACM Code of Ethics; Center for the Study of Ethics in the Professions (Illinois Institute of Technology) |
1b 5-16
|
Legal & Ethical Information Practices |
Toxen, Ch. 21 Special Agents James Harris and Greg Johnson, Federal Bureau of Investigation (USA) |
2a 5-21
|
OS Security Models |
Stallings, Ch. 1 Toxen, Ch. 1 Keith Stevenson |
2b 5-23
|
Encryption |
Stallings, Chapters 2 & 3
Prof. Desoky |
Submission of paper topic due Submission of team project topic due |
||
3a 5-28 | Memorial Day | |
3b 5-30 | Practical Security |
Toxen, Ch. 2 & 3
Stevenson |
4a 6-4 | Security Theory |
Toxen, Ch. 10
Case Studies |
4b 6-6 | IP Security |
Stallings, Chapters 6 & 8 Toxen, Ch. 5 & 5 HIPPA regulations Scott Moore |
5a 6-11 | E-Mail Security |
Stallings, Chapter 5 & 10
Prof. Adel Elmaghraby |
Outline of paper topic and Peer Review of Outline | Submit to Professors Losavio & Ragade | |
5b 6-13 | Secure Protocols | Panel |
6a 6-18 | Firewalls |
Stallings, Ch. 5 & 10
Stevenson |
6b 6-20 |
Intrusion Detection
|
Stallings, Chapter 9
Toxen, Ch. 15, 16 & 17 Essam |
7a 6-25 | Worms & Virii | Stallings, Ch. 9 |
7b 6-27 | Web Security, Java & Active X | Stallings, Ch. 7 |
Draft of paper due - 1 hard copy at beginning of class, 1 electronic copy
emailed to both Professors Ragade and Losavio
Peer Review of draft paper |
Draft to be minimum 8 pages, 12 point Times Roman font, double spaced, 1" margins on 81/2"x11" white unglazed paper; copious citations as footnotes required. | |
8a 7-2 | Recovery From Compromise |
Toxen, Ch. 18, 19 & 20
Stevenson |
Outline of planned presentation due | Submit to Professors Losavio & Ragade | |
8b 7-4 | Independence Day | |
9a 7-9 | Review of Secure Computing & Administrative Practices |
Toxen, Ch. 2 & 7
Ron Moore |
9b 7-11 | Security Policy and Users | Alice Rademacher |
Student papers due-Maximum of 3 pages,12 point Times Roman font, double spaced, 1" margins on 81/2"x11" white unglazed paper; relevant citations as footnotes required. (Turn in at beginning of class) | ||
7-16
Ragade & Losavio |
Class Presentations Groups 1 & 3 |
Approximately ½ hour presentations with class analysis, critique and questions |
7-18
Ragade & Losavio |
Class Presentations Groups 2 & 4 |
Approximately ½ hour presentations with class analysis, critique and questions |
Key for Readings in Schedule:
Required Texts | |
Stallings, William | Network Security Essentials: Applications and Standards |
Toxen, Bob | Real World Linux Security: Intrusion Prevention, Detection & Recovery, 1e |
Supplemental Reading as assigned
© 2001 Rammohan K. Ragade & Michael M.
Losavio
Use for non profit educational
purposes is granted provided source is credited.
Last Revised: June 09, 2001