Instructor:
Jiang B. Liu,
Professor of Computer Science & Information Systems
Phone: (309) 6772386
Lecture Times:
1:30-2:45pm, Tue Thu, in Brd 180
Prerequisites:
Consent of instructor
Office Hours:
3:00-4:30pm, Mon, Wed; 3:00-5:00pm Tue Thu, BR177.
Or by appointment.
This is a computer systems security topic course for computer science undergraduate and graduate students. The goals of the course are to provide students with fundamentals of Computer Security Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security, and Operating System Security. The projects will be coded in C/C++/Java and tested in UNIX/Window and Internet environment, therefore I expect all of you have basic knowledge in C/C++/Java programming language and UNIX/Window operating system.
Unit 1 and Principles |
Overview Cryptographic Tools User Authentication Access Control Database Security Intrusion Detection Malicious Software Denial of Service Firewalls and Intrusion Prevention Systems Trusted Computing and Multilevel Security Learning outcomes: - Have a basic understanding of the fundamental ideas of cryptography. - Understand Intrusions and intrusion detection. - Knowledgeable of recent successful security attacks. - Be able to describe the strengths and weaknesses associated with different approaches to security. |
Ch.1-10 |
Unit 2 |
Buffer Overflow Other Software Security Issues Learning outcomes: - Be able to relate particular security models to the models of the software life cycle. - Be able to develop a strategy for ensuring appropriate levels of security in a software design. - Understand the issues for software security arising from data overflow and other internal attacks. |
Ch. 11-12 |
Unit 3 |
Physical and Infrastructure Security Human Factors Security Auditing IT Security Management and Risk Assessment IT Security Controls, Plans and Procedures Legal and Ethical Aspects Learning outcomes: - Understand the need for protection and security, and the role of ethical considerations in computer software use. - Know the process of security auditing and risk assessment. - Understand the issues for management arising from a range of security threats, including viruses, worms, Trojan horses, and denial-of-service attacks. |
Ch. 13-18 |
Unit 4 |
Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Learning outcomes: - Be able to describe how symmetric-key and public-key cryptography works. - Be able to distinguish between the use of private- and public-key algorithms. - Know the common authentication protocols. |
Ch. 19-20 |
Unit 5 |
Internet Security Protocols and Standards Internet Authentication Applications Learning outcomes: - Be able to identify potential threats to networks and the security features design to guard against them. - Be able to describe and contrast current methods for implementing network security. - Know the basics of how to implement a network firewall. |
Ch. 21-22 |
Unit 6 |
Linux Security Windows and Windows Vista Security Learning outcomes: - Be able to describe the features and limitations of an OS used to provide protection and security. - Understand the mechanisms available in an OS to control access to resources. - Know how to carry out simple sysadmin tasks according to a security policy, for example creating accounts, setting permissions, applying patches, and arranging for regular backups in LINUX and Windows OS. |
Ch. 23-24 |
All assignments are due in the
class on the due day.
Later homework will have 10% subtracted from the score for every late day.
- Assignments:
60%
- Class Attendance: 10%
- Final
Exam:
30%
(90-100 A; 80-89 B; 70-79 C; 60-69 D; below 60 F)
This class home page is posted at "http://hilltop.bradley.edu/~jiangbo/" and will be used to post the assignments and other class information. You are also encouraged to send me email about your questions related to the course or share related information with the class.