Section 001:
Monday, Wednesday 4:25 pm -5:40 pm
SWGN 1A20
Instructor: Csilla Farkas
GTA: Theppatorn Rhujittawiwat, theppatorn@gmail.com, Office: Swearingen
2D19, Office hrs:
TBA
Office: Swearingen 3A43
Office Hours: Monday, Wednesday 1:15 2:45 pm or
electronically any time or by appointment
Telephone: 576-5762
E-mail: farkas@cec.sc.edu
Homepage: http://www.cse.sc.edu/~farkas/csce201-2015/csce201.htm
Section 002:
Tuesday, Thursday 2:50 pm -4:05 pm
SWGN 1A20
Instructor: Phani Krishna Penumarthi
GTA: Theppatorn Rhujittawiwat, theppatorn@gmail.com, Office: Swearingen
2D19, Office hrs:
TBA
Office: TBA
Office Hours: TBA
Telephone: TBA
E-mail:
Homepage: http://www.cse.sc.edu/~farkas/csce201-2015/csce201.htm
Prerequisites: CSCE 101
Course Description:
The focus of the course is to provide a set of
practices the students can deploy immediately to secure their computers and to
maintain safe security practices. The
lectures cover the necessary security concepts and methods to prevent security
breaches and what to do if such a breach is detected. In addition to the lecture materials,
students will be required to complete security lab exercises, performing
hands-on experiments on safe security practices. The hands-on experiences enable the students
to deal with security threats and to apply appropriate counter measures. The students will learn about securing
popular computer platforms and applications running on these platforms.
Course Objectives:
Text:
Required: Computer
Security Fundamentals (2nd Edition) 2nd Edition by William (Chuck) Easttom II, Paperback: 352 pages, Publisher: Pearson IT
Certification; 2 edition (December 30, 2011), ISBN-10: 0789748908, ISBN-13: 978-0789748904
Grading:
Test 1: 15%, Test 2: 15%,
Test 3: 35% Homework: 35%
Total score that can be
achieved: 100
Final grade: 90 < A
, 87 < B+ <=90, 80 < B
<= 87, 77 < C+ <= 80, 65 < C <= 77,
60 < D+ <= 65, 52 < D <= 60,
F <=
52
Tentative Schedule
Weeks 15: Basic Security
Concepts
Week
1: Overview of computer security, common problems
Attackers
and security management, risk ant threat
Week
2:Operating Systems
Security
capabilities of different platforms
Week
3:Identification and authentication
Passwords,
choosing, managing, spoofing attacks
User
accounts, file permissions, backups
Week
4:Access Control and Firewalls, ownership
Basic
cryptography
Week
5:Assessing and Securing a system
Weeks 610: Home Computer
Security Hardening the System
Week
6:Software security
Malware:
Viruses, worms, freeware and spyware
Week
7:Network security, TCP/IP primer
Firewall
and Router security, PKI
Week
8:Web security
Web
application security
Week
9:Internet Fraud and Cyber Crime
Weeks 1115: Lets Have Fun
Popular applications, ethics, security and privacy
Week
10:Cyber terrorism and information warfare
Week
11:E-commerce, online banking, Semantic Web
Industrial
Espionage
Week
12:Security and privacy policies
Licensed software and license servers vs. freeware
Week
13:Social Networking
File
Download
Week
14:Ethical issues
Week
15:Review for Final