CSCE 201 Introduction to Computer Security

Fall 2015

Section 001: Monday, Wednesday 4:25 pm -5:40 pm

SWGN 1A20

Instructor:        Csilla Farkas

GTA:               Theppatorn Rhujittawiwat, theppatorn@gmail.com, Office: Swearingen 2D19, Office hrs: TBA

Office:             Swearingen 3A43

Office Hours:  Monday, Wednesday 1:15 – 2:45 pm or electronically any time or by appointment

Telephone:       576-5762

E-mail:             farkas@cec.sc.edu

Homepage:      http://www.cse.sc.edu/~farkas/csce201-2015/csce201.htm

 

 

 

Section 002: Tuesday, Thursday 2:50 pm -4:05 pm

SWGN 1A20

Instructor:        Phani Krishna Penumarthi

GTA:               Theppatorn Rhujittawiwat, theppatorn@gmail.com, Office: Swearingen 2D19, Office hrs: TBA

Office:             TBA

Office Hours:  TBA

Telephone:       TBA

E-mail:             p.phanikrishna@gmail.com

Homepage:      http://www.cse.sc.edu/~farkas/csce201-2015/csce201.htm

 

 

Prerequisites: CSCE 101

 

 

Course Description: 

The focus of the course is to provide a set of practices the students can deploy immediately to secure their computers and to maintain safe security practices.  The lectures cover the necessary security concepts and methods to prevent security breaches and what to do if such a breach is detected.  In addition to the lecture materials, students will be required to complete security lab exercises, performing hands-on experiments on safe security practices.  The hands-on experiences enable the students to deal with security threats and to apply appropriate counter measures.  The students will learn about securing popular computer platforms and applications running on these platforms. 

 

 

Course Objectives:

  1. Understand basic concepts and practices of information security 
  2. Understand tools and techniques used by attackers to penetrate computer systems 
  3. Understand tools and techniques used by defense to protect computer systems 
  4. Be able to check for security updates, apply and use patches and other defense mechanisms
  5. Be able to understand and follow security and privacy policies
  6. Understand the ethical implications of using attack tools on computer systems

 

 

Text:

Required:  Computer Security Fundamentals (2nd Edition) 2nd Edition by William (Chuck) Easttom II, Paperback: 352 pages, Publisher: Pearson IT Certification; 2 edition (December 30, 2011),    ISBN-10: 0789748908,           ISBN-13: 978-0789748904

 

Grading:

Test 1: 15%, Test 2: 15%, Test 3: 35% Homework: 35%

Total score that can be achieved: 100

Final grade:      90 < A ,  87 < B+ <=90, 80 < B <= 87, 77 < C+ <= 80, 65 < C <= 77,

60 < D+ <= 65, 52 < D <= 60, F  <= 52

 

Tentative Schedule

Weeks 1—5: Basic Security Concepts

            Week 1: Overview of computer security, common problems

Attackers and security management, risk ant threat

            Week 2:Operating Systems

                        Security capabilities of different platforms

            Week 3:Identification and authentication

                        Passwords, choosing, managing, spoofing attacks

                        User accounts, file permissions, backups

            Week 4:Access Control and Firewalls, ownership

                        Basic cryptography

            Week 5:Assessing and Securing a system

 

Weeks 6—10: Home Computer Security – Hardening the System

            Week 6:Software security

                        Malware: Viruses, worms, freeware and spyware

Week 7:Network security, TCP/IP primer

                        Firewall and Router security, PKI

            Week 8:Web security

                        Web application security

Week 9:Internet Fraud and Cyber Crime

Weeks 11—15: Let’s Have Fun – Popular applications, ethics, security and privacy

Week 10:Cyber terrorism and information warfare

            Week 11:E-commerce, online banking, Semantic Web

                        Industrial Espionage

            Week 12:Security and privacy policies

Licensed software and license servers vs. freeware

            Week 13:Social Networking

                        File Download

Week 14:Ethical issues

Week 15:Review for Final