Introduction to Security
Tuesday, 12:00 - 3:00PM
jjoshi [AT] mail.sis.pitt.edu
Monday : 1:30 - 3:00PM
(HW6 Sample Sol added)
(Note that the midterm date has been changed – see the schedule)
(Midterm is on Nov 3)
Special note: The coverage of this course has been primarily guided by the requirements of some of the CNSS standards (about 85% of the content). In addition, the course also attempts to cater to students who are interested in taking a single course but would like to gain a broad understanding of issues in information security.
The overall goal of the course is to develop a broader understanding of the information security field, so that the student can
· Recognize, analyze and evaluate security problems and challenges in networks and systems.
· Apply their knowledge to synthesize possible approaches to solve the problems in an integrated way.
More specifically, the goals of the course are to develop the skills to:
· Analyze and evaluate the fundamentals of security policy models and mechanisms, and their need for different types of information systems and applications
· Apply the basics of Cryptographic techniques and network security for ensuring the basic security goals of security of information systems.
· Recognize the various security issues/terminologies related to software, networks and applications to show how they are interrelated and available techniques and approaches to solve/tackle security problems.
· Describe/identify the various social, legal and non-technical dimensions of security and its relation to technical counterparts.
· TEL2000 OR Equivalent Background; Instructor Permission
In essence, the following is expected of the students
· Basic knowledge of: operating systems, data structures, database systems and networks; Java.
· Basic mathematics: undergraduate mathematics, some knowledge about mathematical logic, set notation, etc. These issues will be reviewed in the course.
Students not sure about the required background should meet the instructor.
· The course attempts to explore some theoretical issues for which the stated mathematical background is essential.
· The course will involve some Java programming.
Other Reference Material
A list of papers will be provided to supplement the book
NOTE: To access online books and article from off-campus, use the following link: sslvpn.pitt.edu
The following link gives more info: http://www.library.pitt.edu/services/remote.html
Homework/Quiz/Paper Review 50%
If you have a disability for which you are or may be requesting an accommodation, you are encouraged to contact both your instructor and Disability Resources and Services, 140 William Pitt Union, 412-648-7890 or 412-383-7355 (TTY) as early as possible in the term. DRS will verify your disability and determine reasonable accommodations for this course.