This is a course that looks at the various issues surrounding the provision of computer security in today's computing environment. It is a survey course designed to provide an overview of the security problem, the technical aspects of security, how it relates to operating systems, database, networks, management controls, electronic commerce, and programming environments. Encryption techniques are discussed and protocols that use encryption are described. It is not a hacker course and does not teach system penetration – other than from the defensive point of view. Students are expected to conduct some independent research in the class.
Computer crime and computer forensics are areas of study that are rapidly growing in importance and visibility. With the increased ease with which an unscrupulous person can access the internet and commit crimes with and against computers, and the increased emphasis on homeland defense in this country, there is a growing need for computer science and software engineering graduates with the skills to investigate these crimes. This course will introduce the topics of computer crime and computer forensics. Students will be required to learn different aspects of computer crime and ways in which to uncover, protect and exploit digital evidence. Students will be exposed to different types of tools, both software and hardware, and be able to use them to perform rudimentary investigations.
Present day networks face continuous threats from hackers. An understanding of the potential perils, and the strengths and limitations of existing solutions to this problem is relevant not only for students specializing in security, but for every person for whom a computer is an indispensable part of life.This course introduces private and public key encryption, key distribution (Kerberos, public key infrastructure), cryptographic hash functions, digital signatures, IP Security, Secure Socket Layer, WEP (Wired Equivalent Privacy for wireless networks), intrusion detection, Firewalls, denial of service, spam, email viruses, phishing, and an overview of many attacks that the Internet has experienced, especially in the last decade.
Computer users are regularly presented with malware of many different varieties. This course will teach the students how to use modern tools for reverse engineering of machine code to analyze this code to determine how it works and how it can be defeated.
This is a course that looks at the various current research issues surrounding the provision of computer security in today's computing environment. It is a course designed to provide an appreciation for current information assurance research topics, unsolved problems, and the current state of the science. Students will be expected to discover new papers, present those papers, lead discussions in class, and to work toward a publishable research paper on a security topic. This is not a lecture course - it is a discussion group with shared responsibility. There will be some work required in the Security Lab.
This is a course focused on business information security. Students are expected to be able to evaluate and choose computer security equipment, and to be able to configure the equipment based on business information security requirements. Attention is given to the plan-protect-respond cycle of infomation secuinformationplication security, incident and disaster response, and management of the security function are covered along with an overview of the technical background that is needed to undergird business information security. Graduate students are expected to conduct independent research in the course.
This undergraduate course is focused on business information systems analysis and design. It covers the process of planning, analysis, design, and implementation of modern information systems within the organizational context, and also exposes students to rapid prototyping techniques, project management, and related topics. System security management principles are stressed throughout the design life cycle, with specific emphasis on front-end (user-oriented) security features of databases and interfaces. Teams develop logical system designs that include details for user and database security.
This course examines key issues in the ecommerce environment including business models, Internet marketing, on-line monetary transactions, and legal, ethical and social issues of electronic commerce.An overview of computer and network security is presented and students examine phishing attacks, spoofed email, SQL-injection, and privacy violations. Students are required to build a web site supported by shopping cart and database technology. The site is built after examination of the privacy and security features that are implemented in the popular e-commerce sites.
This graduate course is an in-depth exploration business information systems development, with a focus on the management of processes including in-house development, rapid prototyping, and contractual outsourcing. Within this context, attention is given to the establishment of a proactive security perspective for all elements of system development, starting with vulnerability assessment. Individual students present reports on security management approaches and technologies. Teams develop detailed logical system designs that include details for system security.