Lecture 1

6 downloads 34904 Views 100KB Size Report
Aug 31, 2009 ... MAT 270: Security of Computers and. Their Data. Prof. ... Course materials: ▫ Text: Principles of Information Security, 3rd Edition, by Michael.
MAT 270: Security of Computers and Their Data Prof. Shamik Sengupta [email protected] http://jjcweb.jjay.cuny.edu/ssengupta/ Fall 2009

Introduction 8/31/2009

What is the course about?  Introductory course for computer data and information security  Goals:  Learn about security - concepts, practice

 Enjoy the class…

3

Course Information  Course materials:  Text: Principles of Information Security, 3rd Edition, by Michael Whitman and Herbert Mattord. (ISBN: 978-1-4239-0177-8)

 Class notes and other articles provided by the instructor  Class meeting:  North Hall, 2507  M, W: 9:40am – 10:55am

 Office hours:  North Hall, 4210  M, W: 8:30am – 9:30am or By appointments ([email protected]) 4

Course Information (more)  Class WWW site:  http://jjcweb.jjay.cuny.edu/ssengupta/  Blackboard Online  Materials will be posted on these sites  syllabus  class notes  assignments

 Feel free to ask me any questions…  When emailing: “MAT 270 ” 5

Course Information (more)  Workload and grading:  Project: ~ 25%  Homework assignments: ~ 40%  Mid-term exams : ~ 35%

 Late Submission Policy:  Each day after the submission due date will deduct one (1) point  Submission will not be accepted after four (4) days  Permission needed for exceptional circumstances 6

Course Information (more)  Project: (Approx. 3 months time)  Any topics pertaining to security issues in computer / network / Internet (discuss with the instructor)  Individual / 2 person team project (??)

 Homework assignments  Usually 1 week for submission

 Midterm Exam  There will be Two (2) midterm exams  1 in-class and 1 take-home

 NO FINAL EXAM 7

Questions, Comments…??

8

Course Overview Chapter 1: Introduction to Information Security  What is information?  What is security?    

Why is it important? History of computer security What is computer crime? System View…

Chapter 2: The Need for Security  Threats to computers  Computer crime attacks  Detailed classifications  Virus, Worm, Trojan Horse, Denial of Service, Spoofing and many others…

9

Course Overview Chapter 4 & 5: Risk Management and Planning for Security  What are risk management and identification?  Assessing and prioritizing risks  Planning for security and training

Chapter 6 & 7: Security Technology  Firewalls and VPNs  Access control  Intrusion detection  Other tools… 10

Course Overview Chapter 8: Cryptography  Foundations of Cryptology  Cipher methods  RSA  Attacks on Cryptosystems

Suggestions Any special topics? 11