CS412/610 03 Computer System Security -- spring 2010

Contents

General Information

Instructor:

Jiang B. Liu, jiangbo@bradley.edu

Professor of Computer Science & Information Systems

Phone: (309) 6772386

Lecture Times:

1:30-2:45pm, Tue Thu, in Brd 180

Prerequisites:

Consent of instructor

Office Hours:

3:00-4:30pm, Mon, Wed; 3:00-5:00pm Tue Thu, BR177.

Or by appointment.

Course Materials

Topics & Schedule

This is a computer systems security topic course for computer science undergraduate and graduate students. The goals of the course are to provide students with fundamentals of Computer Security Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security, and Operating System Security. The projects will be coded in C/C++/Java and tested in UNIX/Window and Internet environment, therefore I expect all of you have basic knowledge in C/C++/Java programming language and UNIX/Window operating system.

 

Unit 1 
Computer Security Technology

and Principles

Overview

Cryptographic Tools

User Authentication

Access Control

Database Security

Intrusion Detection

Malicious Software

Denial of Service

Firewalls and Intrusion Prevention Systems

Trusted Computing and Multilevel Security

 

Learning outcomes:

- Have a basic understanding of the fundamental ideas of cryptography.

- Understand Intrusions and intrusion detection.

- Knowledgeable of recent successful security attacks.

- Be able to describe the strengths and weaknesses associated with different approaches to security.

Ch.1-10

Unit 2 
Software Security

Buffer Overflow

Other Software Security Issues

 

Learning outcomes:

- Be able to relate particular security models to the models of the software life cycle.

- Be able to develop a strategy for ensuring appropriate levels of security in a software design.

- Understand the issues for software security arising from data overflow and other internal attacks.

Ch. 11-12

Unit 3 
Management Issues

Physical and Infrastructure Security

Human Factors

Security Auditing

IT Security Management and Risk Assessment

IT Security Controls, Plans and Procedures

Legal and Ethical Aspects

 

Learning outcomes:

- Understand the need for protection and security, and the role of ethical considerations in computer software use.

- Know the process of security auditing and risk assessment.

- Understand the issues for management arising from a range of security threats, including viruses, worms, Trojan horses, and denial-of-service attacks.

Ch. 13-18

Unit 4
Cryptographic Algorithms

Symmetric Encryption and Message Confidentiality

Public-Key Cryptography and Message Authentication

 

Learning outcomes:

- Be able to describe how symmetric-key and public-key cryptography works.

- Be able to distinguish between the use of private- and public-key algorithms.

- Know the common authentication protocols.

Ch. 19-20

Unit 5
Internet Security

Internet Security Protocols and Standards

Internet Authentication Applications

 

Learning outcomes:

- Be able to identify potential threats to networks and the security features design to guard against them.

- Be able to describe and contrast current methods for implementing network security.

- Know the basics of how to implement a network firewall.

Ch. 21-22

Unit 6 
Operating System Security

Linux Security

Windows and Windows Vista Security

 

Learning outcomes:

- Be able to describe the features and limitations of an OS used to provide protection and security.

- Understand the mechanisms available in an OS to control access to resources.

- Know how to carry out simple sysadmin tasks according to a security policy, for example creating accounts, setting

permissions, applying patches, and arranging for regular backups in LINUX and Windows OS.

Ch. 23-24

Assignments

All assignments are due in the class on the due day.
Later homework will have 10% subtracted from the score for every late day.

Grading

- Assignments:            60%
- Class Attendance:    10%
- Final Exam:              30%
(90-100 A; 80-89 B; 70-79 C; 60-69 D; below 60 F)

Communication

This class home page is posted at "http://hilltop.bradley.edu/~jiangbo/" and will be used to post the assignments and other class information. You are also encouraged to send me email about your questions related to the course or share related information with the class.