Lecture1 - 1 IS 2150 / TEL 2810 Introduction to Security...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 1 August 31, 2009 2 Contact Instructor: James B. D. Joshi 706A, IS Building Phone: 412-624-9982 E-mail: jjoshi@pitt.edu Web: http://www.sis.pitt.edu/~jjoshi/ Office Hours: Monday: 1.30 3.00 p.m. By appointments GSA: Amirreza Masoumzadeh <amirreza@sis.pitt.edu> 3 Course Goals to develop a broader understanding of the information security field, Recognize , analyze and evaluate security problems and challenges in networks and systems. Apply their knowledge to synthesize possible approaches to solve the problems in an integrated way. Analyze and evaluate the fundamentals of security policy models and mechanisms, and their need for different types of information systems and applications Apply the basics of Cryptographic techniques and network security for ensuring the basic security goals of security of information systems. Recognize the various security issues/terminologies related to software, networks and applications to show how they are interrelated and available techniques and approaches to solve/tackle security problems. Describe/identify the various basic social, legal and non-technical dimensions of security and its relation to technical counterparts. 4 Certified for IA Standards SAIS Track is certified for 5 CNSS standards This course accounts for about 85% of the first three CNSS standards Hence CORE course for SAIS track Course webpage: http://www.sis.pitt.edu/~jjoshi/courses/IS2150/Fall09/ 5 Course Outline Security Basics General overview and definitions Security models and policy issues Basic Cryptography and Network security Crypto systems, digital signature, authentication, PKI IPSec, VPN, Firewalls Systems Design Issues and Information assurance Design principles Security Mechanisms Auditing Systems Risk analysis System verification Intrusion Detection and Response Attack Classification and Vulnerability Analysis Detection, Containment and Response/Recovery Legal, Ethical, Social Issues Evaluation, Certification Standards Miscellaneous Issues Malicious code, Mobile code Digital Rights Management, Forensics Watermarking, E/M-commerce security, Multidomain Security Identity/Trust Management 6 Course Material Textbook Introduction to Computer Security , Matt Bishop, Errata URL: http://nob.cs.ucdavis.edu/~bishop/ Computer Security: Art and Science , Matt Bishop is fine too Other Recommended Security in Computing, Charles P. Pfleeger, Prentice Hall Inside Java 2 Platform Security, 2 Edition, L. Gong, G. Ellision, M. Dageforde...
View Full Document

Page1 / 36

Lecture1 - 1 IS 2150 / TEL 2810 Introduction to Security...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online