Download The Role of Security in an Introductory Course

yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Malware wikipedia , lookup

Information security wikipedia , lookup

Information privacy law wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Mobile security wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Information Security in an
Introductory Course
Kathy Winters
University of Tennessee at Chattanooga
Department of Computer Science and
Coordinator of Computer Literacy
Lecturer – Java, Information Security, Capstone
[email protected]
Introductory Course Definition
• Depends
• 2 or 4 year school
• Course of study
Web development
Information Technology
Information Management
Computer Science
Service Course
Questions To Be Answered
• What do we teach?
• When do we teach it?
• Who do we teach it to?
Routine / Traditional / Minimal
Theft of Computer
Spyware & Pop ups
Secure Connections
> Firewalls
> Service Pack
> Cookies
> Encryption
> Data Backups
> Phishing
What Do We Teach
Social Engineering
Shoulder surfing
Thumb drives
Clean people
Students in the lab
Not closing our applications
Giving away our info
What Do We Teach
Social Networks
• Dangers of sharing information
• Future employers are using these to
screen applicants
• Posting pictures of our families with
identifying information
• Impersonation
What Do We Teach
Internet searches
• Know the source – Is it reliable
• Wikipedia
• Source for papers
• Source of code
• Does it contain a virus
• Copyright violations
• Music, games
Consolidation of Data
Search patterns
Open docs
Data mining
Other General Topics
What Do We Teach
Web Design Classes
Cleaning input
Input size checking
Special character checking
SQL injection
What Do We Teach
Security issues
History and why
Basics of securing wireless transmissions
Encrypted transmission
What Do We Teach
Programming Classes
Buffer overflows
Secure coding
Defensive programming
Trap doors