Introduction to Security Informatics

L Jean Camp
Scheduled for Fall 2007
Wednesdays 4:00 - 5:15
Informatics Room 107

Office Hours
Informatics Building 200
Mondays 3-5pm
Wednesdays 2-4pm
Grading Guidelines

40% class participation in class and on on-course participation are both counted.
60% weekly essays due every week

Participation in the classroom and in the discussion area in On-Course are both credited. If you are more comfortable speaking than writing, or more comfortable writing as opposed to speaking, you may choose only one. Participation should illustrate that any assigned reading has been complete, or when there are no readings that the course presentation was carefully watched. Participation professional in tone will not be counted as a positive contribution. To be perfectly clear, any student who diminishes the contributions of less advanced students will find his or her own grade suffers.

In terms of the weekly writing, each week there is a 300 word commentary on the lecture. The commentary may be a summary, or a comment, or you may ask a question, or you may connect the lecture to some current event. The commentary must illustrate awareness (to be passable) and understanding (to be excellent) of the lecture materials. Grammar and spelling count.


Notice all of these sessions cannot fit into one semester. However, these examples of past sessions illustrate the possible diversity of the lecture


Oct. 24 Peer Production of Security

Jean Camp, Associate Professor of Informatics
The best deterrant to crime is public view. Are you ever in a crowd on-line? How can a group of naive people create reliable information about security?

Oct. 31 Ubiquitous Security

Professor Kay Connelly, Associate Professor, Computer Science.
As computers become as ubiquitous as lighting, can privacy be maintained?

Nov. 7 Cryptography

Steve Myers, Assistant Professor, Informatics.
The mastery of mathematics meant millions of lives saved in WW II. Today it means billions of dollars in Internet commerce.

Nov. 14 Security in Practice

Mark Bruhn, Chief IT Security and Policy Officer, IU.
Security in theory is different from in practice. What does it mean to secure a network? How do network managers view security, and what are the real-world threats likely to be faced by security managers.

Nov. 21 Happy Thanksgiving

Thanksgiving is a celebration of coming together in the third English settlement in the Americas. The first English colony was destroyed during warfare with the local people and the second defended itself fiercely ( Jamestown). Like the network today, both cooperation and the need for security played critical roles in early settlement of America.

Nov. 28 Malware on the Network

Raquel Hill, Assistant Professor, Informatics and Computer Science.
Connectivity is exposure. Network risks include denial of service, masquerade attacks, and directing hacking assaults. This session will focus on understanding the threats created on and in the network.

Dec. 5 Forensic Security

Doug Wampler
How do you pick up a digital trail? What data do we leave behind on our drives, and clicks, and passages through virtual space?