Module 13
Security / Classes
Outline Chapter 16
Chapter 16 The World Wide Web
16.1 Spinning the Web
Search Engines
Instant Messaging
Weblogs
Cookies
Web Analytics
16.2 HTML and CSS
Basic HTML Elements
Tag Attributes
More About CSS
More HTML5 Elements
16.3 Interactive Web Pages
Java Applets
Java Server Pages
16.4 XML
16.5 Social Networks
Ethical Issues: Gambling and the Internet
Outline Chapter 17
Chapter 17 Computer Security
17.1 Security at All Levels
Information Security
17.2 Preventing Unauthorized Access
Passwords
CAPTCHA
Fingerprint Analysis
17.3 Malicious Code
Antivirus Software
Security Attacks
17.4 Cryptography
17.5 Protecting Your Information Online
Security and Portable Devices
WikiLeaks
Ethical Issues: Blogging
Additional Resources
Why Google tracks you video (14:41)
TED Talk Beware online "filter bubbles"
Related FGCU Courses
http://icarus.fgcu.edu:8080/CourseDescriptions/
CEN 3078 Software Security
This course covers the foundations of software security, discussing threats, vulnerabilities and attacks that exploit them. Prevention and mitigation techniques will be covered, from threat modeling, to building security in the design, to penetration techniques, and others. Emphasis will be given on addressing security at respective stages of the software development cycle, including security assessment.
ISM 4323 Security Essentials
This course is focused on the fundamental concepts, architectures and protocols related to network security. Topics include overview of network security; basics of cryptography; threat models; authentication and authorization mechanisms and standards; electronic mail security; network layer security; web security; packet filtering, firewalls; intrusion detection, and virtual private networks.
Lesson
Day One (Ch. 16)
Search
Google Advanced Search
Google Image Search
Usage rights
SEO
Cookies
Web Analytics
Programming Methodology
IPO
Day Two (Ch. 17)
Security
Computer Security and Privacy
Password techniques
How to Protect Your Online Privacy Now That Congress Sold You Out
Time Warner/Spectrum customers can find their privacy dashboard here.
Comcast customers can opt out of some targeted programs using these instructions.
Verizon customers can find opt out options here.
Remember, your phone company is technically an ISP too, so look up your options on that front as well.
Video (2:17)
Shared key
with colors Public key cryptography
with math Diffie-hellman key exchange
Project Review
Arrays
Loops
Project Preview
JavaScript 5: jQuery / Day 4: Classes
Information Assurance and Security (IAS)
Information assurance and security as a domain is the set of controls and processes both technical and policy intended to protect and defend information and information systems by ensuring their confidentiality, integrity, and availability, and by providing for authentication and non-repudiation. The concept of assurance also carries an attestation that current and past processes and data are valid. Both assurance and security concepts are needed to ensure a complete perspective. Information assurance and security education, then, includes all efforts to prepare a workforce with the needed knowledge, skills, and abilities to protect our information systems and attest to the assurance of the past and current state of processes and data. The importance of security concepts and topics has emerged as a core requirement in the Computer Science discipline, much like the importance of performance concepts has been for many years.
KA Topics:
CIA (Confidentiality, Integrity, Availability)
Concepts of risk, threats, vulnerabilities, and attack vectors (cros- reference SE/Software Project Management/Risk)
Authentication and authorization, access control (mandatory vs. discretionary)
Concept of trust and trustworthiness
Ethics (responsible disclosure). (cross-reference SP/Professional Ethics/Accountability, responsibility and liability)
KA Learning outcomes:
Analyze the tradeoffs of balancing key security properties (Confidentiality, Integrity, and Availability). [Usage]
Describe the concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security). [Familiarity]
Explain the concepts of authentication, authorization, access control. [Familiarity]
Explain the concept of trust and trustworthiness. [Familiarity]
Describe important ethical issues to consider in computer security, including ethical issues associated with fixing or not fixing vulnerabilities and disclosing or not disclosing vulnerabilities. [Familiarity]