I130 Introduction to Cybersecurity

An overview of Introduction to Cybersecurity.
Professor Jean Camp

 

Introduction
Introduction to Cybersecurity is designed to provide undergraduate students with a 10,000 ft overview of both cybersecurity as a concept and an area of study. The course will provide an opportunity to hear not only the faculty but also the professionals who protect the Indiana University network. Participation does not require understanding more than the lecture; as there are no technical requirements for taking the course. The course is ideal for those students who are enrolled in Informatics or Computer Science; but it is also extremely accessible to those who are simply curious as to the risks they face on the network. The material will be targeted at a level appropriate for freshman, and clarifying questions are more than welcome.

 

Grading

40% class participation in class and on OnCourse participation are both counted.
60% weekly quizes creatd on OnCourse and every week

In terms of participation both in the classroom and in the discussion area in On-Course are considered. If you are more comfortable speaking than writing, or more comfortable in writing than speaking, you may choose only one. Participation should illustrate that any assigned reading has been complete. Participation that is not professional in manner will not be counted as a positive contribution. Please treat your colelagues in the classroom with respect on the principle of the matter. Please also note that participation that is counter-productive and unprofessional will be counted against the participant.

In terms of the weekly quizes, each week there is a quiz on OnCourse based on the material as presented in the lecture. The quiz may be more of a summary, or based on a highlight, or even on responses to other student's questions. Take notes, and the quiz will be easy for you. The online quizes are designed to test your awareness (to be passable) and understanding (to be excellent) of the lecture materials.

 

Overview
This course introduces students to network and computer security. The course will primarily focus on introduction to three core areas (technical aspects of security in practice, organizational aspects of security, and the material that a student minoring in security will see). Through examples of security problems in real life, this course will illuminate fundamental ideas and concepts of information security.
This eight week course has not been fully scheduled at the time this is written, in August, before many people return from their summer travels. The sessions below are examples from past year, not commitments from the speakers to participate this year. Obviously, the first session is set, as I teach the course so I know I will be available.

Session 1: The Course in a Nutshell

Professor Jean Camp
Introduction to the basic concepts of security. Introduction to the faculty, grading and class organization.

Security in Practice

How does security function as an organizational and ethical construct? How does security interact with organizational and social informatics?
Mark Bruhn, Chief IT Security and Policy Officer, IU.
Security in theory is different from in practice. What does it mean to secure a network? How do network managers view security, and what are the real-world threats likely to be faced by security managers.

Security Mathematics

Steve Myers, Associate Professor, Informatics.
Cryptography has been used since the time of the ancient Egyptians, and historically has been used mostly for military purposes. We will introduce the notion of cryptography; briefly discuss the huge effect it has had on human history; discuss how in modern times cryptography is being used for more and more commercial (and thus non-military) applications. We will briefly discuss the one-time pad, substitution ciphers, symmetric key cryptography, and public-key cryptography.

Security in the Network

Raquel Hill, Assistant Professor, Informatics and Computer Science.
Connectivity is exposure. Network risks include denial of service, masquerade attacks, and directing hacking assaults. This session will focus on understanding the threats created on and in the network.

Happy Thanksgiving

Thanksgiving is a celebration of coming together in the third English colony, and the second surviving English settlement, in the Americas. The first English colony was destroyed during warfare with the local people and the second defended itself fiercely to survive ( Jamestown). Like the network today, both cooperation and the need for security played critical roles in early settlement of America. Please check OnCourse for your assignment for this week!

Privacy in Ubicomp

Kay Connelly, Associate Professor of Computer Science.
Security is based on concepts of transactions, log-in and specified roles. Ubicomp violates all those assumptions. What does it mean if you are authenticating by walking into a room? Security policies, privacy issues and security in practice are the topics of this session.

Security & Incentives

Xiaofeng Wang, Assistant Professor of Informatics.
Security can be used to create a set of incentives or to limit interaction. Introduction to security as an economic concept.

Security at Indiana

University Security Practitioners and Faculty
Security research and degree programs at Indiana. The last session of the course essentially answers the question, Where do you go from here, depending on what you enjoyed in the course?

Malware in Peer to Peer Networks

Minaxi Gupta, Assistant Professor of Computer Science.
Security is based on concepts of transactions, log-in and specified roles. P2P can violate all those assumptions. What risk are you taking when you download your music.