CSCE 201
Introduction to Computer Security
Fall 2015
Lectures |
||
|
||
Date |
Topic |
Reading |
08/20 (T) |
IA Education at USC |
·
IA education
overview ·
Course info |
08/24 (M) 08/25 (T) |
Basic Security concepts |
·
Easttom Ch.1 – Introduction to Computer
Security ·
Interesting: 1. CSO business report: Cybersecurity job market to suffer severe workforce
shortage, http://www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html
, 7/28/2015 2. Internet Security Threat Report 2015,
Symantec, https://know.elq.symantec.com/LP=1542?cid=70150000000diToAAI
|
08/26-31 08/27-09/01 |
Basic Security concepts |
·
Easttom Ch.1 Interesting link: ·
Windows 10 and Privacy 1. Microsoft, Windows 10 and privacy, http://windows.microsoft.com/en-us/windows-10/windows-privacy-faq
2. PCWorld, “How to reclaim your privacy in Windows 10,
piece by piece,” http://www.pcworld.com/article/2971725/windows/hw-to-reclaim-your-privacy-in-windows-10-piece-by-piece.html |
09/02 09/03 |
Basic Security concepts |
·
Easttom Ch.2 – Networks and the Internet |
09/07 |
Labor Day |
·
No classes |
09/09 09/08-10 |
Basic Security concepts (cont.) |
·
Easttom Ch.2 – Networks and the Internet |
09/14,16 09/15, 17 |
Identification and Authentication |
·
An
Introduction to Computer Security: The NIST Handbook, http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf : Chapter 16, IDENTIFICATION |
09/21-23 09/22-24 |
Internet Fraud |
·
Easttom Ch. 3 – Cyber Stalking, Fraud, and
Abuse Interesting Reading: ·
Homeland
Security News Wire, A first: Anti-fraud system to use existing credit card
readers, Sept. 23, 2015, http://www.homelandsecuritynewswire.com/dr20150923-a-first-antifraud-system-to-use-existing-credit-card-readers
|
END OF TEST 1 MATERIALS |
||
09/28-30 09/29-10/1 |
Browser safety |
Web Browser security Required
reading ·
5 Ways to Secure Your
Web Browser, Zone Alarm by Check Point, 2014, http://www.zonealarm.com/blog/2014/05/5-ways-to-secure-your-web-browser/
|
10/05-07 10/06-08 |
USC Closed |
|
10/12 10/13 |
Secure Application Development |
·
·
Required reading: ·
G. McGraw, Software
[In]security: Software Security Zombies, 07/2011, http://www.informit.com/articles/article.aspx?p=1739924
|
10/14 10/15 |
TEST 1 |
|
10/19 10/20 |
Access Control |
·
Easttom Ch. 10 – Security Policies ·
An Introduction to
Computer Security: The NIST Handbook, http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf : Chapter 17, LOGICAL ACCESS CONTROL, pages
180-192 |
10/21 10/19 |
Access Control Cont. |
·
Easttom Ch. 10 – Security Policies ·
Windows AC support |
10/26 10/27 |
Lack of Availability |
·
Easttom Ch.4 – Denial of Service Attacks |
|
|
|
11/ 2 11/3 |
Physical Security and Backups |
·
Easttom Ch.11 – Securing individual
workstations |
11/4-11 11/5-12 |
Data Recovery and cryptography |
·
Easttom Ch.8 – Encryption |
END OF TEST 2 MATERIALS |
||
11/13 11/14 |
Malicious code Hardware attacks Recovery |
·
Easttom Ch. 5 on virus, Ch 12 on Virus
scanners and Anti-spyware ·
Malicious
Codes in Depth, http://www.securitydocs.com/library/2742 |
11/18 11/19 |
Test 2 |
·
|
11/23 |
Network Security Basics |
·
Firewalls Lecture Notes, Intrusion
Detection Lecture Notes ·
Easttom Ch.9 |
11/30 |
Open Sources Privacy |
·
Electronic Privacy Information Center, http://www.epic.org/
·
G. Sandoval, Verizon sending antipiracy
notices for Hollywood, too,
http://news.cnet.com/8301-31001_3-10397708-261.html?tag=mncol |
|
|
|
12/09
|
4:00
PM |
FINAL EXAM |