Information Security Curriculum at IIT - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Information Security Curriculum at IIT

Description:

Expect 10 hours per week on student work in preparing for class ... Packet Sniffing UDP/TCP, with message handling. Intrusion Detection System. Paper Presentation ... – PowerPoint PPT presentation

Number of Views:77
Avg rating:3.0/5.0
Slides: 11
Provided by: davidgr6
Category:

less

Transcript and Presenter's Notes

Title: Information Security Curriculum at IIT


1
Information Security Curriculum at IIT
  • David Grossman
  • grossman_at_iit.edu

2
Overview
  • Information Security Lab
  • Information Security Course
  • Objectives
  • Assignments
  • Lessons Learned
  • Information Security Specialization

3
Information Security Lab
  • Fill in machines, etc. here

4
Information Security
  • Course Objectives

5
Information Security Course
  • Topics
  • Introduction
  • Elementary Cryptography
  • Program Security
  • OS Security
  • Trusted OS
  • Network Security
  • Database Security
  • Administering Security
  • Expect 10 hours per week on student work in
    preparing for class
  • 7 Programming Assignments (each assignment
    designed to take students no more than 20 hours
    to complete)
  • Student Presentation of Research Paper
  • Mid-Term and Final Exam
  • Textbook C. Pfleeger and S. Pfleeger, Security
    in Computing, Prentice Hall..

6
Information Security Course
  • Assignments were grouped into two themes. On
    average 2 weeks per assignment. All assignments
    are posted at ltfill this ingt
  • Theme 1 SSH Server
  • Prepare for Encryption Large Integer Processing
  • Implement Public Key Cryptography (RSA)
  • SSH Server
  • Theme 2 Building a Robust Intrusion Detection
    System
  • Rule-based Firewall Implementation
  • Packet Sniffing UDP/TCP, with message handling
  • Intrusion Detection System

7
Paper Presentation
  • Students were required to form groups of 2-3 and
    choose a published research paper from a list
    that we provided.
  • Students then
  • Posted presentation materials one week prior to
    the presentation
  • Delivered the presentation to the class
  • Posted a 2-3 page written summary of the
    presentation
  • Test covered all material presented in student
    presentations

8
Presentation Papers
  • Give titles here.

9
Lessons Learned
  • Assignments
  • 6-7 Assignments works better than 3-4.
  • More manageable for students
  • More likely that students will have a success
  • Students have a very hard time integrating 3rd
    party libraries (e.g. integer processing,
    network packet processing).
  • This is due to configuration problems, every
    student does assignment on different compilers,
    different OS.
  • Discussion board very helpful. Students
    frequently post problems.
  • Presentations
  • Sample Presentation very helpful
  • Students must be incentivized to submit their
    presentation materials well in advance.
    Summaries are still fairly week. Sample summary
    would probably help.
  • Discussion board very helpful. Students
    frequently post problems.
  • Textbook Verbose, not as many algorithms as we
    would like. Evaluation of other books still in
    progress.

10
Specialization
  • New undergraduate specialization in information
    security
  • Data Communications
  • Information Security
  • Cryptography (graduate course)
Write a Comment
User Comments (0)
About PowerShow.com