CSCE 201 Introduction to Computer Security

Fall 2015

 

 

Lectures

 

 

Date

Topic

Reading

08/20 (T)

IA Education at USC

·         IA education overview

·         Course info

08/24 (M)

08/25 (T)

 

Basic Security concepts

 

IA educational slides

·         Easttom Ch.1 – Introduction to Computer Security

·         Lecture Notes

·         Interesting:

1.      CSO business report:  Cybersecurity job market to suffer severe workforce shortage,  http://www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html , 7/28/2015

2.      Internet Security Threat Report 2015, Symantec,  https://know.elq.symantec.com/LP=1542?cid=70150000000diToAAI

08/26-31

08/27-09/01

Basic Security concepts

·         Easttom Ch.1

·         Lecture Notes

Interesting link:

·         Windows 10 and Privacy

1.      Microsoft, Windows 10 and privacy,  http://windows.microsoft.com/en-us/windows-10/windows-privacy-faq

2.      PCWorld, “How to reclaim your privacy in Windows 10, piece by piece,” http://www.pcworld.com/article/2971725/windows/hw-to-reclaim-your-privacy-in-windows-10-piece-by-piece.html

09/02

09/03

Basic Security concepts 

·         Easttom Ch.2 – Networks and the Internet

·         Lecture Notes

09/07

Labor Day

·         No classes

09/09

09/08-10

 

Basic Security concepts   (cont.)

·         Easttom Ch.2 – Networks and the Internet

·         Lecture Notes

09/14,16

09/15, 17

 

 

Identification and Authentication

·         An Introduction to Computer Security: The NIST Handbook, http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf  : Chapter 16, IDENTIFICATION AND AUTHENTICATION, pages 180-192

·         Lecture Notes

09/21-23

09/22-24

 

 

Internet Fraud

·         Easttom Ch. 3 – Cyber Stalking, Fraud, and Abuse

·         Lecture Notes 

 

Interesting Reading:

·         Homeland Security News Wire, A first: Anti-fraud system to use existing credit card readers, Sept. 23, 2015, http://www.homelandsecuritynewswire.com/dr20150923-a-first-antifraud-system-to-use-existing-credit-card-readers

END OF TEST 1 MATERIALS

09/28-30

09/29-10/1

 

Browser safety

 Web Browser security

·         Lecture Notes

Required reading

·         5 Ways to Secure Your Web Browser, Zone Alarm by Check Point, 2014, http://www.zonealarm.com/blog/2014/05/5-ways-to-secure-your-web-browser/

10/05-07

10/06-08

USC Closed

10/12

10/13

 

Secure Application Development

·       Lecture notes

·          

·         Required reading:

·         G. McGraw, Software [In]security: Software Security Zombies, 07/2011,  http://www.informit.com/articles/article.aspx?p=1739924

10/14

10/15

TEST 1

 

10/19

10/20

 

Access Control

·         Easttom Ch. 10 – Security Policies

·         An Introduction to Computer Security: The NIST Handbook, http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf  : Chapter 17, LOGICAL ACCESS CONTROL, pages 180-192

·         Lecture Notes

10/21

10/19

 

 

Access Control

Cont.

·         Easttom Ch. 10 – Security Policies

·         Windows AC support

10/26

10/27

Lack of Availability

·         Easttom Ch.4 – Denial of Service Attacks

·         Lecture Notes

10/28

10/29

 

No class on Wednesday

10/28

Attend one of these events:

1.      Securing the Future for Women in IT, Wednesday, October 28, 2015 at 5:30 pm,  IT-oLogy, 1301 Gervais St. Suite 200, Columbia SC, Register at:  http://www.techjunto.com/events/966

2.      Last Lecture Series, Wednesday, October 28, Dr. Duncan Buell, Department of Computer Science and Engineering, 7 pm in the Gressette Room of Harper College 3rd floor, https://sc.edu/ofsp/last_lecture_series.shtml

3.      or look at the The 2015 (ISC)2  Global Information Security Workforce Study and submit a 1 page summary of your reading in class, https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/GISWS/FrostSullivan-(ISC)%C2%B2-Global-Information-Security-Workforce-Study-2015.pdf

11/ 2

11/3

Physical Security and Backups

·         Easttom Ch.11 – Securing individual workstations

·         Lecture Notes

11/4-11

11/5-12

Data Recovery and cryptography

·         Easttom Ch.8 – Encryption

·         Lecture Notes

 

END OF TEST 2 MATERIALS

11/13

11/14

Malicious code

 

Hardware attacks

Recovery

·         Lecture Notes

·         Easttom Ch. 5 on virus, Ch 12 on Virus scanners and Anti-spyware

·         Malicious Codes in Depth, http://www.securitydocs.com/library/2742

11/18

11/19

Test 2

·          

11/23

Network Security Basics

 

 

·         Firewalls Lecture Notes, Intrusion Detection  Lecture Notes

 

·         Easttom Ch.9

11/30

Open Sources

Privacy

·         Lecture Notes

·         Electronic Privacy Information Center, http://www.epic.org/

·         G. Sandoval, Verizon sending antipiracy notices for Hollywood, too, http://news.cnet.com/8301-31001_3-10397708-261.html?tag=mncol

12/2

 

E-commerce, online banking

·         Lecture Notes

·         E. Mills, Hackers create tools for disaster relief, http://news.cnet.com/8301-27080_3-10398073-245.html?tag=mncol

·         M. Asay, The convenient fiction that Microsoft is evil, http://news.cnet.com/8301-13505_3-10398203-16.html?tag=mncol

·         Top 10 Web Application Security Vulnerabilities, http://www.upenn.edu/computing/security/swat/SWAT_Top_Ten.php

12/09

4:00 PM

FINAL EXAM