4990 Network Security Fall 2002

 

 Last edited:  Tuesday November 12, 2002 08:01:00 AM -0500

 

 

Security has become more and more of an issue in recent years. However it has become a GREAT issue today. We constantly hear about penetrations of Web sites, Denial of Service attacks, young and old hackers, and of course we receive half a dozen viruses as well. Hackers today do not have to be computer science majors who would write complicated code and bombard you with viruses.  The sophistication of hackers is going down. Anyone can become a hacker nowadays. However, the tools at a hacker's disposal have become sophisticated.

American companies are spending less on network security than on coffee for the employees.

You will find few companies that have standard policy and procedures. What do you do if you are on the 5th floor of a building and the fire alarm sounds? Well, you vacate the area, you help people with needs, and you do not use the elevator. Correct?

So, what do you do if you notice your computer spinning round madly at 100:00 pm as you work late at the office? Most people will reply that they will call the Technology centre during working hours. Yes, and if it is closed? What do you do? "Ah, forget it , not my problem, someone will figure it out tomorrow".

It appears that most issues in security can be solved with technology. Unfortunately, security issues are much more complex than that. Security has to do with PEOPLE. No matter how much technology we implement, there is one factor that we can not ignore. You and Me.

The book we will use is split into 4 parts. I have collected ALL the books available to me from publishers. Eric Maiwald, Chief Technology Officer of Fortrex technologies, has authored a book that suits our purpose beautifully.

Together with the book, we will examine software that is available today, we will examine hardware and we will conduct this class mainly hands - on. We will look at the legal aspects, we will look at the international arena, and we will write policy and procedures for our own company. We will examine practical solutions, information security basics and managing risk. . We will complete this semester by becoming Web of trust e-notaries.

This course is not only for the MIS student. This course is for the end user, the Manager of an accounting or audit  department, the VP of a company who needs to implement policy. This is a great course for your resume. You could be the person writing the policy and procedures of your company. You could become the security officer of the company.  

Welcome to this Network Security class.

Text Book : Network Security - Eric Maiwald ISBN : 0-07-213324-4 OSBORNE/MCGRAWHILL  2001

 

Exam 1 20%
Exam 2 20% 
Project 1  15%
Project 2 15%
Assignments 15%
Class participation 15%
Total  100%
   
Professional quality in the organization, completeness, neatness, and timeliness of material handed in will be expected (including exams).  
   
   

 

Grading scale
95-100% A
90-94% A-
87-89% B+
84-86% B
81-83% B-
78-80% C+
75-77% C
72-74% C-
69-71% D+
66-68% D
63-65% D-
<63% F

 

 

| Home | Communicating with me | CGS 3300 Syllabus| ISM 4220 Syllabus| ISM 4220 Class Schedule Fall 2002| 4220 Project 1|ISM 4220 Class Schedule Spring 2003| ISM 4990 Syllabus| ISM 4990 Class Schedule Fall 2002 | ISM 4990 Class schedule Spring 2003 | ISM 4113 Syllabus | ISM 4113 Class schedule Spring 2003 | ISM 4054 Syllabus | ISM 4054 Class schedule Spring 2003 |

Tests, Quizzes, Exams and Homework