Course Description:
In devising strategies for information assurance or cyber security, it is of highest importance to consider how data operates within a system or over a network, and the necessary methods and tools needed to mitigate the assurance risk to this data. Complexity via massive interconnection and interdependency within network and system topologies has created a situation where subversion of these entities is both simple and common. This leads to a multitude of threats, notably the exfiltration of information, data corruption or system/network breaches. This fundamental threat to data integrity is at the heart of the information security challenge, and subsequently is impactful in both insuring continued economic prosperity and national security.
This course provides a detailed analysis of the fundamentals of information security in the context of distributed systems and networks. It carefully examines the threat developed in the distributed systems and networks. It examines information security policies in the context of distributed systems and networks. It examines the available security mechanisms that are applicable to the distributed systems and network to include authentication and cryptography. It investigates the application of the security mechanisms to the underlying services of the distributed system and network and the specific threat mitigation achieved. It investigates the integration of secure services into the development of secure distributed systems and network applications and utilities to include secure mail, secure web services, secure wireless. It investigates system security issues to include firewalls, and intrusion detection systems.
This course is intended for first year graduate students. The typical student will be coming out of computer science, mathematics, computer engineering, or informatics program. It is recommended that students have a working understanding of communication networks and computer architecture, and some programming facility.
This class will be primarily individual study, with weekly assigned readings, five homework assignments, one take home quiz, one project, a midterm and a final. The course will also have nine laboratory assignments which will be separate from the lecture period and performed outside of the class time. Each lab assignment will take approximately five to six hours to complete. Students may work in teams on the lab assignments and on the semester project.
Objectives:
There are seven learning objectives for students in this course:
1. Understand the fundamentals of securing information systems
2. Understand the concept and nature of threat in the distributed and network context
3. Understand the structure and role of the security policy in developing the distributed and network security solutions
4. Have a detailed understanding of network security mechanisms to include cryptography and the reference monitor
5. Understand the application of the security mechanisms to distributed and network information services
6. Understand the application and utilization of firewalls and intrusion detection systems to the network and distributed system
7. Develop an appreciation for the requirements and processes of secure systems management
Additionally, there are three applied learning objectives:
1. Methods of Authentication
2. Awareness and Protection
3. Public Key Infrastructure and Distribution Models