Lecture1 - 2150 TEL 2810 IS 2150 TEL 2810 Introduction to...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 2150 / TEL 2810 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 1 August 30, 2011 1 Contact Instructor: James B. D. Joshi 706A, IS Building hone: 412- 24- 982 Phone: 412 624 9982 E-mail: [email protected] Web: http://www.sis.pitt.edu/~jjoshi/ Office Hours: Thursday: 1.30 – 3.00 p.m. By appointments SA: GS Amirreza Masoumzadeh <[email protected]> Natalie Baracaldo <[email protected]> ondays 2 p m 2 Mondays 2-4 p.m Course Goals to develop a broader understanding of the information security field, Recognize, analyze and evaluate security problems and challenges in networks and systems. eir knowledge to synthesize possible approaches to e Apply their knowledge to synthesize possible approaches to solve the problems in an integrated way. Recognize the various security issues/terminologies related to software, networks and Recognize the various security issues/terminologies related to software, networks and Analyze and evaluate the fundamentals of security policy models and mechanisms, and Analyze and evaluate the fundamentals of security policy models and mechanisms, and applications to show how they are interrelated and available techniques and approaches to solve/tackle security problems. applications to show how they are interrelated and available techniques and approaches to solve/tackle security problems. their need for different types of information systems and applications their need for different types of information systems and applications Apply the basics of Cryptographic techniques and network security for ensuring the basic security goals of security of information systems. Apply the basics of Cryptographic techniques and network security for ensuring the basic security goals of security of information systems. 3 Describe/identify the various basic social, legal and non-technical dimensions of security and its relation to technical counterparts. Describe/identify the various basic social, legal and non-technical dimensions of security and its relation to technical counterparts. Certified for IA Standards SAIS Track is certified for 5 CNSS andards standards 85% of content address the requirements of the first three CNSS standards Hence CORE course for SAIS track ourse webpage: Course webpage: http://www.sis.pitt.edu/~jjoshi/courses/IS2150/Fall10/ 4 Course Outline Security Basics General overview and definitions Security models and policy issues Intrusion Detection and Response ttack Classification and Privacy Basic Cryptography and Network security rypto systems, digital signature, Attack Classification and Vulnerability Analysis Detection, Containment and Response/Recovery egal Ethical Social Issues Crypto systems, digital signature, authentication, PKI IPSec, VPN, Firewalls Systems Design Issues and formation assurance Legal, Ethical, Social Issues Evaluation, Certification...
View Full Document

This note was uploaded on 12/01/2011 for the course INFSCI 2501 taught by Professor Jjoshi during the Spring '11 term at Pittsburgh.

Page1 / 36

Lecture1 - 2150 TEL 2810 IS 2150 TEL 2810 Introduction to...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online