Administrative Details Chapter 0 Professor: Oberta A. Slotterbeck (Obie) Computer Science Department Hiram College obie@hiram.edu
Textbook Textbook: Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison Wesley, ISBN 0-321-51294-4
Administrative details Homework exercises, discussion of them in class - 15% Lab exercises - started in class and written up as lab reports - 35% Test 1 - 25% Test 2 - during finals week at assigned time - 25%
Goals of the Course After completing this course, successfully, you will be able to correctly 1. Use computer security terminology 2. Analyze and articulate the goals of computer and information security 3. Recognize modern threats and mitigation techniques 4. Discuss security needs and requirements 5. Articulate the need for security and auditing 6. Describe and recognize basic cryptographic techniques and some modern implementations
Goals - continued 7. Identify and use secure programming techniques 8. Articulate the security needs of operating systems, databases, and networks and how they are protected. 9. Design and administer security policies 10. Identify ethical and moral issues related to security. 11. Identify the different security tools that may be used to protect system
Class web site: http://cs.hiram.edu/~obie/cpsc35200 There will be a password protected web site established. It’s use and access will be described in class later. Be sure you read and understand the college policies with respect to your academic work