Module 13

Security / Classes

Outline Chapter 16

Chapter 16 The World Wide Web

  • 16.1 Spinning the Web

    • Search Engines

    • Instant Messaging

    • Weblogs

    • Cookies

    • Web Analytics

  • 16.2 HTML and CSS

    • Basic HTML Elements

    • Tag Attributes

    • More About CSS

    • More HTML5 Elements

  • 16.3 Interactive Web Pages

    • Java Applets

    • Java Server Pages

  • 16.4 XML

  • 16.5 Social Networks

  • Ethical Issues: Gambling and the Internet


Outline Chapter 17

Chapter 17 Computer Security

  • 17.1 Security at All Levels

    • Information Security

  • 17.2 Preventing Unauthorized Access

    • Passwords

    • CAPTCHA

    • Fingerprint Analysis

  • 17.3 Malicious Code

    • Antivirus Software

    • Security Attacks

  • 17.4 Cryptography

  • 17.5 Protecting Your Information Online

    • Security and Portable Devices

    • WikiLeaks

  • Ethical Issues: Blogging

Additional Resources

Related FGCU Courses

http://icarus.fgcu.edu:8080/CourseDescriptions/

CEN 3078 Software Security

This course covers the foundations of software security, discussing threats, vulnerabilities and attacks that exploit them. Prevention and mitigation techniques will be covered, from threat modeling, to building security in the design, to penetration techniques, and others. Emphasis will be given on addressing security at respective stages of the software development cycle, including security assessment.

ISM 4323 Security Essentials

This course is focused on the fundamental concepts, architectures and protocols related to network security. Topics include overview of network security; basics of cryptography; threat models; authentication and authorization mechanisms and standards; electronic mail security; network layer security; web security; packet filtering, firewalls; intrusion detection, and virtual private networks.

Lesson

Day One (Ch. 16)


Day Two (Ch. 17)


Project Review

    • Arrays

    • Loops


Project Preview


Information Assurance and Security (IAS)

Information assurance and security as a domain is the set of controls and processes both technical and policy intended to protect and defend information and information systems by ensuring their confidentiality, integrity, and availability, and by providing for authentication and non-repudiation. The concept of assurance also carries an attestation that current and past processes and data are valid. Both assurance and security concepts are needed to ensure a complete perspective. Information assurance and security education, then, includes all efforts to prepare a workforce with the needed knowledge, skills, and abilities to protect our information systems and attest to the assurance of the past and current state of processes and data. The importance of security concepts and topics has emerged as a core requirement in the Computer Science discipline, much like the importance of performance concepts has been for many years.

KA Topics:

  • CIA (Confidentiality, Integrity, Availability)

  • Concepts of risk, threats, vulnerabilities, and attack vectors (cros- reference SE/Software Project Management/Risk)

  • Authentication and authorization, access control (mandatory vs. discretionary)

  • Concept of trust and trustworthiness

  • Ethics (responsible disclosure). (cross-reference SP/Professional Ethics/Accountability, responsibility and liability)


KA Learning outcomes:

  1. Analyze the tradeoffs of balancing key security properties (Confidentiality, Integrity, and Availability). [Usage]

  2. Describe the concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security). [Familiarity]

  3. Explain the concepts of authentication, authorization, access control. [Familiarity]

  4. Explain the concept of trust and trustworthiness. [Familiarity]

  5. Describe important ethical issues to consider in computer security, including ethical issues associated with fixing or not fixing vulnerabilities and disclosing or not disclosing vulnerabilities. [Familiarity]