Computer System Security Syllabus-1 of 4 Computer System Security Syllabus CIS 282 Computer System Security Section 01 Course Description: Prerequisites Textbook and Resources Instructor Office Email Office Hours Instructors Web Site Address Course Objectives Fall, 2005 MTRF 9:00-9:50 AM OM 307 This course introduces the basics of network security. The student will be introduced to computer network vulnerabilities and threats and how to safeguard computer networks from those vulnerabilities and threats. This course will expose the student to network security planning, network security technology, network security organization and the legal and ethical issues associated with network security CIS 265 Understand computer, network and information security. Explain why network security is important Explain network security prevention, detection and response. Define and explain the concept of network confidentiality. Define and explain the concept of information integrity. Define and explain the concept of network availability. Define and explain the concept of network auditability. Define and explain the concept of non-repudiation. Understanding management’s role in the development, implementation and maintenance of network security. Understand the value of education, training and awareness programs to the organization. Understand security architecture, it’s principles, components and employment. Define risk management and its role in security policy and security architecture. Understand the relationship between risk, threats, vulnerabilities and countermeasures. Identify and describe risk mitigation strategies. Define and describe Disaster recovery Plans. 1 of 4 Computer System Security Syllabus-2 of 4 Define and describe an Incident Response Plan. Define and describe a Business Continuity Plan. Describe the various functions related to database security. Understand the need for constantly evaluating the status of security management. Understand the difference between policies, procedures, standards and guidelines. Understand the process of encryption and define the key cryptography terms. Understand the difference between asymmetric and symmetric encryption. Discuss scanning and analysis tools Describe the various types of firewalls. Describe the various types of Intrusion Detection Systems. Understand the difference between Host Based Intrusion Detection and Network Based Intrusion Detection. Describe the operation of Virtual Private Networks. Understand the importance of authentication and the characteristics of a good password. Describe the various approaches to biometrics access control. Understand the position of the network security element within the organization. Understand the skills required to staff the network security element. Describe the functional elements associated with network security. Understand the relationship between an organizations employment practices and policies and the network security function. Understand the position of the CIRT element within the security function. Explain the various credentials that can be acquired by the security professional and their value. Identify and explain the major laws relating to network security. Understand the issue of privacy and its impact upon the network security function. Understand the issue of ethics and its relationship to the security function. Understand the cultural differences related to ethics. Understand the necessity for a code of ethics. Understand the potential for organizational liability with regard to network security. Understand and describe the tradeoffs security, privacy and operations. 2 of 4 Computer System Security Major topics Syllabus-3 of 4 A. Network security basics, security architecture, security models, and the six keys to network security B. Network security Planning, Risk Management and Policy C. Network security technology D. Network security organization E. Legal, privacy and ethical issues 3 of 4 Computer System Security Outcomes 1. Define and explain the concepts of confidentiality, information integrity, availability, non-repudiation, and audit trails. 2. Describe the role and significances of the following components in overall security management: o Employee training and awareness o Risk management o Risk mitigation strategies. 3. Develop and / or evaluate the following types of information security plans: o Disaster recovery o Incident response o Business continuity 4. Describe the primary practices related to database information security 5. Articulate the role and foundation technology underlying the following tools: o Encryption both asymmetric and symmetric o Scanning and analysis tools o Intrusion detection systems, both host-based and network based o Virtual Private Networks and firewalls 6. Identify and explain the major laws, ethical concerns, cultural differences and liabilities related to information security Syllabus-4 of 4 Outcome measures Unit tests and related lab assignments Unit test and case study Unit test , case study, lab assignments Unit test, lab assignments Lab assignments, final exam Unit test, final exam NOTE: This course encompasses the objectives of the industry-based Security Plus exam and is based on extensive use of lab exercises that demonstrate implementation and application of concepts. 4 of 4