Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University Coastal Carolina University Conway,

Slides:



Advertisements
Similar presentations
HIPAA Security.
Advertisements

New MS (CS) IBA Philosophy and Objectives.
Session # 48 Security on Your Campus: How to Protect Privacy Information Robert Ingwalson.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2011.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2010.
SSME (Services Science, Management, and Engineering) Ronald Dattero Information Technology Service Management (ITSM) Curriculum Missouri State University.
Web Design! John Paxton Montana State University - Bozeman CCSC Northwestern Region Saturday, October 8 th, 2004.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Uniqueness of user names is enforced Customer information logged to database Require contact information as well as address address will.
Using Open-Source Solutions to Teach Computing Skills to Psychology Students David Allbritton DePaul University
CNIL Report April 4 th, CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Computer and Information Technology Core courses focus on problem solving and communication skills for Information Technology professionals involved in.
Developing an Undergraduate Distributed Development Course Gregory Conti John M. D. Hill Curtis A. Carver, Jr. United States Military Academy Department.
COMPUTER SCIENCE LYNDA THOMAS – SENIOR LECTURER, ACADEMIC ADVISOR.
Welcome to USA DAY at University of South Alabama School of Computer and Information Sciences
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
A First Course in Information Security
SEC835 Database and Web application security Information Security Architecture.
Securing the System A K-12 Case Study. Background Rural School District 93% Free and Reduced Lunch 1100 students 3 Schools 1 Systems Administrator.
By Daniel Siassi.  XHTML  For Structure  CSS  For Stylization of Structure  SQL Database  Store Customer, Calendar, and Order Data  PHP  Server-side.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Information Security in an Introductory Course. Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Security Aspects of Web Site Design Office of Enterprise Security (What we look for in web applications and Why)
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Class 5 PHP MySQL Robert Mudge Reference:
Internet Studies Center. ISC Certificate Program  Allows ALL WWU majors to learn web development skills  At WWU graduation: 1. Bachelor’s degree 2.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Computer Science Department 1 Undergraduate Degree Program Computer Science Chair Dr. Kurt Maly.
7 th period Who is Ms. Kaplan??? My involvement at DHS:  I teach Geometry, Intro to Programming, and Pre-Calculus.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
Inventory Management System for Department of Computer Science Group Number
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Fueloil Information Systems Standards and and Evaluation methods Prof. Dr. Mohamed Elazab
GOAL User Interactive Web Interface Update Pages by Club Officers Two Level of Authentication.
Security Considerations Steve Perry
Small Business Security Keith Slagle April 24, 2007.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Computational Thinking for Everyone. Instructor: Dr. Mao Zheng – 217 Wing Technology – campus – campus phone: – course.
Secure & Asymmetric Approach for Designing FUTURE INTERNET Presented by Md. Obaidur Rahman Networking Lab, Department of Computer Engineering, Kyung Hee.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Computer Support and Information Tech Advisory Date: Wednesday, October 14, 2015 Time: 8:30—10:00 am Location: Joan Stout, room 244.
Preventing MySQL Injection Sonja Parson COSC 5010 Security Presentation April 26, 2005.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Web Application Development 1 Course Introduction.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Benefits overview Speaker name goes here.
بسم الله الرحمن الرحيم Information’s New Technologies (Internet Technologies) Ahmed Abdelmageed, MSc Department of Computer Science, University of Khartoum.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Qualities of the Best Seafood Restaurants
Top All You Can Eat Seafood Buffets in America
CMIT100 Chapter 15 - Information.
Administrative Details
Technology, Careers, and Job Hunting
LEARN WHY COMPUTERS ARE REVOLUTIONIZING BIOLOGY!
IS4680 Security Auditing for Compliance
Miami Valley Computer Science Circle
Online Grades Calculation and Reporting Application
Level 2 Diploma Unit 11 IT Security
Department of Computer Science & Engineering, HITEC University, Taxila
Undergraduate Degree Program
Data and Applications Security Developments and Directions
Presentation transcript:

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University Coastal Carolina University Conway, SC 8,000+ students An active Computer Science and Information Systems Program (ABET) WELCOME TO MYRTLE BEACH

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University CSCI Introduction to Web Application Development Focus on PHP and MySQL JavaScript validation Captcha Server-side validation with Regular Expressions

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University CSCI Advanced Web Application Development Design and implementation of a password-protected secure login system (membership) Design of secure Ecommerce system Security Policies Fall 2010 Upgrades - Flex and more XML due to important initiatives such as XBRL

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University CSCI System Administration Firewalls General security and SPAM filtering Database administration (including backups)

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University CSCI 385 – Introduction to Computer Security Formulate a plan for a security audit or risk assessment Identity risks to computer and information systems Create a basic threat model for a proposed organization or system Identify and describe vulnerabilities in information systems Encryption Security Policies

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University CSCI/CBAD Database and Ecommerce Privacy policies Terms of service Basic Computer Security issues at the MBA level Available for undergraduates (seniors) to take

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University CSCI 130L – CS0 Lab (1 credit) Featuring Python 3.1 “Learning By Doing” approach Concept of validation Length of strings Validating an Validating zip codes and phone numbers based on length and character set

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University Local employers for jobs and internships SecureWorks (In Myrtle Beach since 1991) WetStone (now adjacent to CCU Campus) Advanced Systems Engineering Technologies

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University Other Activities 4th Annual Computer Security Conference (April 14-16) Techno Security (July) Frequent guest speakers (Ralph Echimendia, Jon Kibler) Grand Strand Technology Council The Internet Column focus on security

Dr. John Stamey Department of Computer Science and Information Systems Computer Security at Coastal Carolina University Comments or questions? Contact John Stamey