CSCD 303 Essential Computer Security Lecture 1 - Course Details.

Slides:



Advertisements
Similar presentations
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 2 Overview James Harland
Advertisements

CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
CSCD 555 Research Methods for Computer Science
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 1 Introduction James Harland
1 BUS 3500 MANAGEMENT INFORMATION SYSTEMS Abdou Illia, Ph.D. (Monday 5/17/2010)
IT344 – Operating Systems Winter 2011, Dale Rowe.
WELCOME TO BIOLOGY 101 FALL BIOLOGY 101 Introductions: My Background Contact Information: –Reagan Lake –Rm 454 (BS Bldg) –
MIS 470: Information Systems Project Yong Choi School of Business Administration CSU, Bakersfield.
James Tam Introduction To CPSC 203 James Tam Administrative (James Tam) Contact Information -Office: ICT 707 -
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
1 CSCD 439/539 Wireless Networks and Security Lecture 1 Overview Fall 2007.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
INTERNET SAFETY FOR STUDENTS
CS529 Multimedia Networking Admin. Topics Background Admin Stuff Motivation Objectives Multimedia!
G53SEC Computer Security Introduction to G53SEC 1.
Bala Kappagantula CGS 1000 Introduction to Computers and Technology Fall 2007.
COMP Introduction to Programming Yi Hong May 13, 2015.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
CS 006 Effective Use of WWW Fall 2007 WeeSan Lee
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Welcome to Physics 1403!!. Class Web Page! There, you can find: 1. Posted (MS Word format): Syllabus,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
IT Project Management MIS 492/592, Fall 2013 CIS 1013.
CGS 1000-FALL 2009 Intro to Computers & Tech. Topics  Syllabus  Faculty Website  Campus Cruiser Introduction to Computers and Technology.
Lecture Section 001 Spring 2008 Mike O’Dell CSE 1301 Computer Literacy.
CSE 113 Introduction to Computer Programming Lecture slides for Week 1 Monday, August 29 th, 2011 Instructor: Scott Settembre.
ECE 461 Internetworking Instructor: Prof. Jörg Liebeherr University of Toronto.
IST 210: Organization of Data
Introduction to Information Security J. H. Wang Sep. 18, 2012.
CS 345 – Software Engineering Nancy Harris ISAT/CS 217
Instructor: Brianna Harris Office Hours: By appointment Address: Web Page:
1 BUS 3500 MANAGEMENT INFORMATION SYSTEMS Abdou Illia, Ph.D. (Monday 8/24/2015)
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Introduction to Mobile Computing -CSE 535 Fall 2010 Sandeep K. S. Gupta School of Computing, Informatics and Decision Systems Engineering Arizona State.
Introduction to Software Engineering Lab Instructor: Jacob.
CS614: Advanced Course in Computer Systems (Spring’04) Instructor: Ken Birman TA: non assigned (yet)
Physics of Animation (Art/Physics 123) Prof. Alejandro Garcia Fall 2009 Class is fully enrolled and I am not allowed to add students. Sorry.
IST 210: ORGANIZATION OF DATA Introduction IST210 1.
B.A. (Mahayana Studies) Introduction to Computer Science November March Preliminaries Some background information for this course.
Lecture 1 Introductions, Overviews, Operating Systems.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
CSE Wireless and Adhoc networks Instructor: Ayman Alharbi Computer Engineering Dept. (Head of dept. ) Why ?
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
1 ECEN209-Computer Architecture (Course Overview & Introduction)
Welcome to 1301! Essentials of College Rhetoric. Contact Info. Instructor: Emily Fox Location: 8 am- 350 or 11 am- 455 Office: English 461 Office hours:
Computer Network Fundamentals CNT4007C
IT Project Management MIS419/576 Fall 2017.
Introduction to Computing
Computer Networks CNT5106C
CS5040: Data Structures and Algorithms
Year 10 ICT ECDL/ICDL IT Security.
CAS CS112 Intro to CS II w/ C++
Teacher name | course number
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Teacher name | course number
CSCD 330 Network Programming Spring
CSCD 303 Essential Computer Security
CSCD 330 Network Programming Spring
Introduction to Comparative Effectiveness Course (HAP 823)
Human Computer Interface
CSCD 303 Essential Computer Security
CSCD 433/533 Advanced Computer Networks
CSCD 330 Network Programming Spring
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Teacher name | course number
CSCD 303 Essential Computer Security
Presentation transcript:

CSCD 303 Essential Computer Security Lecture 1 - Course Details

Contact Information Instructor Carol Taylor Office: 315 CEB Phone: Office Hours: Tue, am Wed, Fri 2 – 3 pm

Course Information Course number and Title CSCD303 Essential Computer Security Course Days and Time – Mon, Wed, Fri – Lecture CEB 227 – am – Tue, Thurs – Lab, CEB 342 – am Web page for the class

Overview Today Pre-requisite knowledge Course overview Some expectations of you and me Learning Objectives for this course

Pre-requisite Knowledge You don’t have to be a computer or security expert – Basic computer knowledge, how to use a computer, Word processor, spreadsheet – Knowledge of virus scanners, firewalls and other security tools helpful, but not required !!! – You will learn all you need to know

Your Background My Assumptions You are Students at EWU No to little experience in Computer Security Technically savy Good at using devices Smart phones, iPads, wireless routers Interested in Security as a topic

Student Learning Objectives At the end of this course you should … Learned about dangers of computer based attacks – Viruses, spyware, identity theft and Web based attacks – Social engineering attacks Learned how to protect yourself from the most common types of attacks – Learned about privacy and common threats to your information

What You Should Do Come to class – Participate, learn and ask questions Download lecture notes Do reading if assigned – – There will be some outside reading There will be more in-class participation than other classes

What You are Expected To Do Class Participation is part of grade – Group exercises in class, part of your grade – Some work out of class to prepare for discussion or exercise Hands-on labs - fun! Opportunities to contribute to class Suggestions for speakers, video or links Will get extra credit for contributing

What is Expected of Me Expect me to guide you in learning – Security is a huge topic, constantly in flux You will likely discover as much information outside of class as is covered in class You are encouraged to share what you learned with the class – In class discussions – Links to other material

Who Am I My Background PhD from University of Idaho in CS Specialty is in Security Also have MS and BS degree in Forestry Have acquired networking expertise at EWU I have more research experience than practical hands-on experience But, I try to keep up on the latest I have a strong bias I often question government control and do we need ever more security to keep us “safe” I encourage you to ask the same questions

What is Expected of Me I will provide feedback I will put interesting links up on our page with your help, likely a wiki for contributions Find some speakers to talk to the class – If you know of someone who can talk … at work, or through your friends

Conclusion This should be a good class and increase your knowledge of security and privacy May be challenging in some of the concepts – Nothing in this course is particularly difficult, but the difficulty is that it is a large topic Not just a technical topic – Many attacks are through exploitation of social norms Trust, relationships – Privacy is also at risk and not just from the bad guys Commercial companies, government

The End Questions? Next Time – Security overview – Read: Chapter 1 – Steal This Book