Professional Documents
Culture Documents
Computer Security
• Required Textbooks:
1. William Stallings, Lawrie Brown, 2nd
edition, 2011, Computer Security:
Principles and Practice, Prentice Hall
Reference Textbooks
• Carlos Solari, 2009, Security in Web 2.0 + World: a
standards based approach, John Wiley and Sons
• Charles Pfleeger, 4th edition, 2007, Security in
Computing, Prentice Hall
• Cole, Krutz, Conley, Reisman, Ruebush, Gollmann,
Reese, 2008,Wiley Pathways Network Security
Fundamentals, John Wiley and Sons
• Davi Ottenheimer, 2012, Securing the virtual
environment: how to defend against attack.
• Dieter, Gollmann, 3rd Edition , 2011, Computer
Security, John Wiley and Sons
Reference Textbooks
• Dwayne Williams, Principles of Computer Security:
Security+ and Beyond, Mc Graw Hill
• Gary M. Jackson, 2012, Predicting Malicious
Behavior: Tools and Techniques for Ensuring Global
Security, John Wiley and Sons
• M Whitman and H. Mattord, 2003, Guide to Network
Defense and Countermeasures, Course Technology
• M Whitman and H. Mattord, 2006, Database Security
and Auditing, Course Technology
• M Whitman and H. Mattord,2nd edition, 2008,
Management of Information Security, Course
Technology
Reference Textbooks
• M Whitman and H. Mattord,3rd edition, 2006, Reading
and Cases in the Management of Information
Security , Course Technology
• M Whitman and H. Mattord,3rd edition, 2010,
Principles of Information Security, Course
Technology
• Matt Bishop, 2003, Computer Security: Art and
Science, Addison-Wesley
• Michael Goodrich,2011, Introduction to Computer
Security, Pearson Education
• Niel Ferguson, Bruce Schneier, 2003, Practical
Cryptography, John Wiley and Sons
• Raymond Pranko, 2004, Corporate Computer and
Network Security, Prentice Hall
Reference Textbooks
• Wenbo Mao, 2004, Modern Cryptography, Prentice
Hall
• Will Allsopp, 2009, Unauthorized access: physical
penetration testing for IT security teams, John Wiley
and Sons
• William Stallings, 2007, 3rd Edition, Network Security
Essentials : Applications and Standards, , Pearson
Education
• William Stallings, 2006, 4th Edition, Cryptography and
Network Security : Principles and Practices, Pearson
EducationCharles Pfleeger, 4th edition, 2007, Security in
Computing, Prentice Hall
Reference Textbooks
• Cole, Krutz, Conley, Reisman, Ruebush, Gollmann,
Reese, 2008,Wiley Pathways Network Security
Fundamentals, John Wiley and Sons
• Dieter, Gollmann, 3rd Edition , 2011, Computer
Security, John Wiley and Sons
• Dwayne Williams, Principles of Computer Security:
Security+ and Beyond, Mc Graw Hill
• M Whitman and H. Mattord, 2003, Guide to Network
Defense and Countermeasures, Course Technology
wee
Lecture Topic(s) Chapter(s)
k starts ends
Introduction, Foundation of security, security
1,2
1 15-Sep 19-Sep policy
2 22-Sep 26-Sep Authentication, Access control. 3,4
Trusted computing and multilevel security, security
13
3 29-Sep 3-Oct models, common criteria
4 5-Oct Database system security. 5
5 6-Oct 10-Oct Intrusion detection systems, firewalls. 8
13-Oct 17-Oct Break
6 20-Oct 24-Oct Malware, Reverse engineering & obfuscation. 6
7 27-Oct 31-Oct Denial of service attacks, protection methods. 7
8 3-Nov 7-Nov Buffer overflows, secure code, cross-site scripting. 10
9 10-Nov 14-Nov Other software security issues, revision. 11
10 17-Nov 21-Nov Phishing, auditing. 18
11 24-Nov 28-Nov Linux security / Windows security 12
12 1-Dec 5-Dec Security of Mobile code Notes
13 8-Dec 12-Dec IT security mgt, risks, controls 14
1 15-Sep 19-Sep
Type: Individual
Description: Programming assignment
Learning Outcome (a), (b),
Measured:
Total Marks: 100
Weighting: 40%
Due Date: Week 3, 6, 9, 12
Word Length (if applicable):
11/25/2018
Some security exploits
Security exploits: phishing