reg Prospectus for Introduction to Cybersecurity

 


 

I130 Introduction to Cybersecurity


Fall 2006
Wednesday 4:00P-5:15P
Location:I 107

 

An overview of Introduction to Cybersecurity.
Professor Jean Camp

 

Introduction
Introduction to Cybersecurity is designed to provide undergraduate students with a 10,000 ft overview of both cybersecurity as a concept and an area of study. The course will provide an opportunity to hear not only the faculty but also the professionals who protect the Indiana University network. Participation does not require understanding more than the lecture; as there are no technical requirements for taking the course. The course is ideal for those students who are enrolled in Informatics or Computer Science; but it is also extremely accessible to those who are simply curious as to the risks they face on the network. The material will be targeted at a level appropriate for freshman, and clarifying questions are more than welcome.

 

Grading

40% class participation in class and on on-course participation are both counted.
60% weekly essays due every week

In terms of participation both in the classroom and in the discussion area in On-Course are considered. If you are more comfortable speaking than writing, or more comfortable tin writing than speaking, you may choose only one. Participation should illustrate that any assigned reading has been complete. Participation that is not professional in manner will not be counted as a positive contribution.

In terms of the weekly writing, each week there is a 150 word commentary on the lecture. The commentary may be a summary, or a comment, or you may ask a question, or you may connect the lecture to some current event. The commentary must illustrate awareness (to be passable) and understanding (to be excellent) of the lecture materials.

 

Overview
This course introduces students to Security. The course will primarily focus on introduction to three core areas (technical aspects of security, organizational aspects of security and legal aspects of security). Through examples of security problems in real life, this course will illuminate fundamental ideas and concepts of information security.

October 25: The Course in a Nutshell

Professor Jean Camp
Introduction to the basic concepts of security. Introduction to the faculty, grading and class organization.

November 1: Your Privacy and Security

Bob Konicek, Network Administrator
As you use the computers and networks in Informatics, what does the school learn about you? Does this align with your expectations?

November 8: Security Protocols

Markus Jakobsson, Associate Professor, Informatics and Computer Science.
Protocols define the syntax and semantics of communication between devices. That is security protocols can be seen as games. Understanding security means understanding the rules and breaking security allows you to cheat.

November 15: Security in Practice

Mark Bruhn, Chief IT Security and Policy Officer, IU.
Security in theory is different from in practice. What does it mean to secure a network? How do network managers view security, and what are the real-world threats likely to be faced by security managers.

November 22:Thanksgiving Day recess

Thanksgiving Day recess

November 29: Malware on the Network

Raquel Hill, Assistant Professor, Informatics and Computer Science.
Connectivity is exposure. Network risks include denial of service, masquerade attacks, and directing hacking assaults. This session will focus on understanding the threats created on and in the network.

December 6: Malware in Peer to Peer Networks

Minaxi Gupta, Assistant Professor of Computer Science.
Security is based on concepts of transactions, log-in and specified roles. P2P can violate all those assumptions. What risk are you taking when you download your music.