CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004
Contact Information l Course web page: l Gunter Office: 509 Levine Telephone: Office hour: 2 to 3 on Mondays l Michael May Web:
Pre-Requisites l TCOM 500 (or 512) is a pre-requisite for enrollment in CIS/TCOM 551 l CIS 500 is recommended l Programming Some programming background is expected. Distributed programming is desirable but we will teach it if you need to learn.
Course Scope l Design l Analysis l Programming Availability Integrity Confidentiality
Questions (Technical) l How does the security for these things work? The ATM for my bank The card reader on door of Levine The fob for opening the doors on my minivan My PennKey The card purchase I made over the web My active badge The wireless network in SEAS My Starbucks card and my DC subway pass
Questions (Policy and Industry) l How can we identify ourselves on the Internet? l How can I Control the privacy of my data? Properly use private data for commercial gain? Properly use private data for enterprise management or research? l Will legislation help us with spam or DoS? l How can we secure computers attached to the Internet?
Organization of Lectures l Security threats, requirements, and models l Cryptology l Protocols l Internet and web architectures and security standards Enterprise perimeters (firewalls and VPNs) Electronic commerce (SSL and web services) l Security topics Smart cards and biometrics Security for ubiquitous computing and wireless networks Topics as time allows
As Time Allows l Denial of Service (DoS) l Viruses l Access control systems l Spam l Legislative and international issues for cybersecurity l Intrusion detection l Privacy (technical and otherwise) l RFID tags
Possible References l Secure Electronic Commerce. Warwick Ford and Michael S. Baum. Prentice Hall l Network Security Essentials: Applications and Standards. William Stallings. Prentice Hall l Firewalls and Internet Security: Repelling the Wily Hacker, WR Cheswick and SM Bellovin, Addison-Wesley, l Security in Computing, CP Pfleeger and SL Pfleeger, 3 rd Edition, 2002.
Handbooks l Handbook of Applied Cryptography. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. CRC l Applied Cryptography, Second Edition, Bruce Schneier, 1996.
History of Cryptology l The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet. David Kahn. Scribner l The Code Book : The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Simon Singh. Anchor Books 2000.
Reading for Fun and Profit l Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Clifford Stoll. Pocket Books l Crypto : How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age. Steven Levy. Viking Press l Cryptonomicon. Neal Stephenson. Harperperennial Library l Secrets and Lies, Bruce Schneier, 2000.
Exams and Projects l Exams First midterm: Feb 10 (drop date is Feb 13) 60 min 15% Second midterm: March 25: 60 min, 15% Final exam: Somewhere between April 29 and May 7, 120 minutes, 30% l Projects 3 or 4 term projects, 25% Final project, due May 7, 15%