4003-471/4005-784 Privacy & Security
| Term: |
20092 |
| Times: |
2:00 - 3:50pm TR |
| Room: |
70-2690 |
Last updated
2010/01/12 13:37:28
Go To:
Description *
Instructor *
Syllabi *
Contents *
Assignments *
Resources
What's New
- 2010/01/12:
- The due date for
homework 3
has been changed to Tuesday, January 19, 2010.
- 2009/12/02:
- I've sent a test message to my mailing list for this course.
The list contains everyone's CS email address.
You should find a copy in your incoming CS email, or wherever you
forward your CS email to (if you have set up email forwarding).
If you don't receive the test message, please let me know.
- 2009/11/30:
- Welcome back to RIT!
- Our ``final exam'' (end-of-quarter wrap-up session) has been
scheduled for
Monday, February 22, 2010, 12:30-2:30pm, 70-2690
.
Description
This course provides students with an introduction to the issues
surrounding security of computer systems and privacy concerns in an
increasingly information-based society. The class will consider
numerous social issues in computing, including risks and liability
involved in using information as well as ethical concerns. Case studies
will be used to illustrate both common and historic problems in
computer security. Where appropriate, programming exercises will be
used to improve understanding of security issues. Exercises may involve
group as well as individual projects.
Instructor
| Name: |
Warren R. Carithers |
| Office: |
3617 Golisano (70-3617) |
| Phone: |
(585) 475-5393 |
| Email: |
wrc AT cs.rit.edu |
Syllabi
Course Contents
Below is a rough outline of the topics we will cover.
This may change depending on the events of the quarter.
- Privacy & Ethics
- General concepts - intellectual property, information
- Major issues - ethics, social responsibility, liability, risks
- Legal issues
- Attacks - personal, corporate
- Defenses
- Security
- Overview - types of security (physical, electronic)
- Policies vs. mechanisms
- Computer-specific
- Operating Systems issues - security models, protection mechanisms
- Networking aspects - protocols, physical issues
- Software - common problems
- Attacks - types, effects, characteristics
- Defenses - tools, resources
- Other
- Physical security
- Policy development and enforcement
- Case Studies
- Electronic commerce
- Password security
- Social engineering
- Classic attacks - Morris worm, sendmail, UCB fingerd, etc.