reg Prospectus for Introduction to Cybersecurity



I130 Introduction to Cybersecurity

Spring 2007
Tuesdays 4:00P-5:15P
Location: BU 306


An overview of Introduction to Cybersecurity.
Professor Jean Camp


Introduction to Cybersecurity is designed to provide undergraduate students with a 10,000 ft overview of both cybersecurity as a concept and an area of study. The course will provide an opportunity to hear not only the faculty but also the professionals who protect the Indiana University network. Participation does not require understanding more than the lecture; as there are no technical requirements for taking the course. The course is ideal for those students who are enrolled in Informatics or Computer Science; but it is also extremely accessible to those who are simply curious as to the risks they face on the network. The material will be targeted at a level appropriate for freshman, and clarifying questions are more than welcome.



40% class participation in class and on on-course participation are both counted.
60% weekly essays due every week

In terms of participation both in the classroom and in the discussion area in On-Course are considered. If you are more comfortable speaking than writing, or more comfortable writing as opposed to speaking, you may choose only one. Participation should illustrate that any assigned reading has been complete, or when there are no readings that the course presentation was carefully watched. Participation that is not professional in manner will not be counted as a positive contribution. To be clear, any student who dimishes the contributions of less advanced students will find his or her own grade suffers.

In terms of the weekly writing, each week there is a 300 word commentary on the lecture. The commentary may be a summary, or a comment, or you may ask a question, or you may connect the lecture to some current event. The commentary must illustrate awareness (to be passable) and understanding (to be excellent) of the lecture materials.


This course introduces students to Security. The course will primarily focus on introduction to three core areas (technical aspects of security, organizational aspects of security and legal aspects of security). Through examples of security problems in real life, this course will illuminate fundamental ideas and concepts of information security.

March 6: The Course in a Nutshell

Professor Jean Camp
Introduction to the basic concepts of security. Introduction to the faculty, grading and class organization.

March 13: Spring Break

Wear sunscreen.

March 20: Pharming and Overview

Alex Tsow, Visiting Research Associate, Informatics
You rely upon the domain name system to connect to the site you you are seeking. This is increasingly becoming a gamble, rather than a reasonable choice.

March 27: Cryptography

Steve Myers, Assistant Professor, Informatics.
The mastery of mathematics meant millions of lives saved in WW II. Today it means billions of dollars in Internet commerce.

April 3: Security in Practice: Mechanism Design

Xiaofeng Wang, Assistant Professor, Informatics.
Protocols define the syntax and semantics of communication between devices. That is security protocols can be seen as games. Understanding security means understanding the rules and breaking security allows you to cheat.

April 10: Phishing

Markus Jakobsson, Associate Professor, Informatics and Computer Science.
In phishing the bait is electronic and you are the target. How can you avoid getting hooked?

April 17: Ubiquitous Security

Professor Kay Connelly, Associate Professor, Computer Science.
As computers become as ubiquitous as lighting, can privacy be maintained?

April 24: Social Informatics of Security

Jean Camp, Associate Professor of Informatics
Security is based on social concepts of identity, trust, and the nature of a transaction.