Information Systems Security Intro

advertisement
Information Systems Security
Course Introduction
Syllabus Key Points
Contact Information
 Course Description
 Student Learning Outcomes
 Course Agenda
 Textbook & Course Web Site
 Grading & Points Distribution
 Assignments
 Exams
 Late Policy
 Lab Use
 Email Accounts

2
Nature of the Course

Non-technical Focus
◦ Terminology, concepts and practices related to information
systems security

Labs and Projects
◦ Allow you to experiment with different kinds of tools
available.

Homework Assignments & Reports
◦ Homework emphasizes key points and tasks based on
reading assignments.
◦ Reports allow you to research additional topics related to
information security.
3
Course Structure
Project-based
Design and develop network test beds
Use test beds to try out different security methods
and approaches
Research-oriented
Students will research and report on different aspects
of security
4
Textbook & Other References
Textbook
Principles of Information Security, Third Edition, Michael E.
Whitman and Herbert J. Mattord, Thomson Course Technology,
2009 - looks boring but is full of good advice
Online References
CERT web site:
http://www.cert.org
Other sites posted on course web site
Other Useful References
Getting Started with Linux: Novell's Guide to CompTIA's Linux+,
Novell & Jason Eckert, Thomson Course Technology, 2007
5
Professional Work Habits and Ethics





Attendance and Punctuality
Attentiveness
◦ No web browsing
◦ No side discussions
Ethical Work
◦ Most assignments will be done in teams.
◦ Some assignments may be required to be completed individually.
◦ In all cases, turn in your own work and your own conclusions.
Work Quality
◦ Neatness, organization and timeliness count in grading
◦ Especially important for project assignments and reports
Behavior and Language
◦ Be respectful of other people.
◦ No cursing, vulgarities, racial slurs, sexual innuendos, or offensive
jokes.
6
UH Smoking Policy


No smoking in classrooms or buildings
No smoking within 25 feet of doorways
7
Purges for Nonpayment

Purges for nonpayment were made before classes start.
◦ If you were dropped and have not already done so, you must reregister for the course.
◦ Drop notifications were sent to your UH email address.

There will be no more purges for nonpayment after the
beginning of classes.
◦ If you do NOT want to take/pay for this class, you MUST drop it. It
will not happen automatically.
8
HCC Wireless Access

Information about HCC wireless access:
◦ http://www.honolulu.hawaii.edu/itc/hotspot/



Configure your wireless card using the
◦ HCC SSID and
◦ WEP or WPA2 key
Log on to the HCC network using
◦ your HCC account username and
◦ You HCC account password
Getting an HCC Account
◦ You should already have an HCC account if you took ICS 100 or ICS
101 at HCC
◦ Otherwise, go to the HCC Computer Lab in Bldg 2 Rm 405
9
Email Forwarding



The default email address in this course is the UH email address
used in MyUH.
To configure forwarding your email to a different address:
 Login to your email account via UH Webmail:
https://mail.hawaii.edu/
 Navigate to Options | Settings
 Enter desired email forwarding address in the Mail Forwarding
field.
 Save changes and exit.
Note: HCC Administration will send official announcments to
your UH email address. So, it's very important that you forward or
check email sent to that account regularly.
10
Student Information

Introductions
 Who you are...
 What would you like to find out about information
security?


Student Information Sheets
Questions?
11
Answers
Partner exercise in class:
Go through the book preface and pick out
the most important advices from the
author (who has 35 years of experience in
security).
Save this file in your dropbox, bc we will get
to it later in the semester.
Discuss your findings with your neighboring
team.
*Report your findings to the whole class.

12
Download