Information Security I
Revised: Oct 2023
Course Description
This course will focus on cryptography; confidentiality, integrity, and availability;
authentication, authorization, and accountability; access control; concepts of risk,
threats, and vulnerabilities; attacks; disaster recovery, backup; and defensive programming.
Prerequisites and Notes
- Completion of, or concurrent enrollment in CS 465.
- 3 Credit hours
Text
Mark Rhodes-Ousley, Information Security, Second Edition, McGraw Hill, 2013
Grading Procedure
Grading procedures and factors influencing course grade are left to the discretion
of individual instructors, subject to general university policy.
Attendance Policy
Attendance policy is left to the discretion of individual instructors, subject to
general University policy.
Course Outline
A Sampling of course topics include:
- Security policies
- CIA (Confidentiality, Integrity, Authority)
- AAA(Authentication, Authorization, Accounting)
- Basic types of threats
- Stream and block ciphers
- Symmetric and Asymmetric algorithms
- Discretionary control mechanisms
- Risks, threats, and vilnerabilities
- DOS attacks
- spoofing
- session hijacking
- botnets, viruses, trojans
- worms and backdoor attacks
- brute force and dictionary attacks
- secure application and writing secure software
- secure development lifecycle
- SQL injection
- buffer overflow, injection vulnerabilities
- input validation and data sanitization