Introduction to Security Informatics

L Jean Camp
Scheduled for Fall 2008
Wednesdays 4:00 - 5:15
Informatics Room 107

Office Hours
Informatics Building 200
Mondays 3-5pm
Wednesdays 2-4pm
Grading Guidelines

40% class participation in class and on on-course participation are both counted.
60% weekly essays due every week

Participation in the classroom and in the discussion area in On-Course are both credited. If you are more comfortable speaking than writing, or more comfortable writing as opposed to speaking, you may choose only one. Participation should illustrate that any assigned reading has been complete, or when there are no readings that the course presentation was carefully watched. Participation professional in tone will not be counted as a positive contribution. To be perfectly clear, any student who diminishes the contributions of less advanced students will find his or her own grade suffers.

In terms of the weekly writing, each week there is a 300 word commentary on the lecture. The commentary may be a summary, or a comment, or you may ask a question, or you may connect the lecture to some current event. The commentary must illustrate awareness (to be passable) and understanding (to be excellent) of the lecture materials. Grammar and spelling count.



Oct 29: Wireless Security

Matt Hotell, Researcher and Lecturer, IU
Security in theory is different from in practice. What do people do in practice for security?

Nov. 5: Economics of Security

Jean Camp, Associate Professor of Informatics
Security choices and behaviors can be conceptualized as a market choice, in both rational and irrational terms.

Nov. 12: Malware on the Network

Andrew Kalafut, Doctoral Research Associate, Informatics and Computer Science.
Connectivity is exposure. Network risks include denial of service, masquerade attacks, and directing hacking assaults. This session will focus on understanding the threats created on and in the network.

Nov. 19: Footprints on the Web

Camilo Viecco, Doctoral Research Associate, Computer Science.
Whatis Bit Torrent? What is Tor? Why would someone choose anonymous communication?

Nov. 21 Happy Thanksgiving

Thanksgiving is a celebration of coming together in the third English settlement in the Americas. The first English colony was destroyed during warfare with the local people and the second defended itself fiercely ( Jamestown). Like the network today, both cooperation and the need for security played critical roles in early settlement of America. Please check OnCourse for your assignment for this week!

Dec. 3 Ubiquitous Security

J Duncan, Doctoral Researcher, Computer Science.
As computers become as ubiquitous as lighting, can privacy be maintained?

Dec 10: The Nature of Malware

XiaoFeng Wang, Assistant Professor, Informatics
What is a buffer over-run? What is a virus and how is it different from a worm?