Aug 31, 2009 ... MAT 270: Security of Computers and. Their Data. Prof. ... Course materials: ▫ Text:
Principles of Information Security, 3rd Edition, by Michael.
MAT 270: Security of Computers and Their Data Prof. Shamik Sengupta ssengupt
[email protected] http://jjcweb.jjay.cuny.edu/ssengupta/ Fall 2009
Introduction 8/31/2009
What is the course about? Introductory course for computer data and information security Goals: Learn about security - concepts, practice
Enjoy the class…
3
Course Information Course materials: Text: Principles of Information Security, 3rd Edition, by Michael Whitman and Herbert Mattord. (ISBN: 978-1-4239-0177-8)
Class notes and other articles provided by the instructor Class meeting: North Hall, 2507 M, W: 9:40am – 10:55am
Office hours: North Hall, 4210 M, W: 8:30am – 9:30am or By appointments (
[email protected]) 4
Course Information (more) Class WWW site: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Online Materials will be posted on these sites syllabus class notes assignments
Feel free to ask me any questions… When emailing: “MAT 270 ” 5
Course Information (more) Workload and grading: Project: ~ 25% Homework assignments: ~ 40% Mid-term exams : ~ 35%
Late Submission Policy: Each day after the submission due date will deduct one (1) point Submission will not be accepted after four (4) days Permission needed for exceptional circumstances 6
Course Information (more) Project: (Approx. 3 months time) Any topics pertaining to security issues in computer / network / Internet (discuss with the instructor) Individual / 2 person team project (??)
Homework assignments Usually 1 week for submission
Midterm Exam There will be Two (2) midterm exams 1 in-class and 1 take-home
NO FINAL EXAM 7
Questions, Comments…??
8
Course Overview Chapter 1: Introduction to Information Security What is information? What is security?
Why is it important? History of computer security What is computer crime? System View…
Chapter 2: The Need for Security Threats to computers Computer crime attacks Detailed classifications Virus, Worm, Trojan Horse, Denial of Service, Spoofing and many others…
9
Course Overview Chapter 4 & 5: Risk Management and Planning for Security What are risk management and identification? Assessing and prioritizing risks Planning for security and training
Chapter 6 & 7: Security Technology Firewalls and VPNs Access control Intrusion detection Other tools… 10
Course Overview Chapter 8: Cryptography Foundations of Cryptology Cipher methods RSA Attacks on Cryptosystems
Suggestions Any special topics? 11