Professional Documents
Culture Documents
R I TDubai
COURSE INFORMATION
Instructor
ixpcada@rit.edu
Required Reading
Clifford Stole, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer
Espionage
Course Description
This course provides an introduction to the fundamental issues, concepts and tools common to all areas
of computing security. Topics include identifying attackers and their motivations. Essential techniques will
be introduced covering the areas of anti- virus, monitoring, virtual machines, account control, and access
rights management. Various security models will be investigated. Concept areas such as confidentiality,
Integrity, availability and privacy will be studied. (Pre-requisites: None)
Describe the potential computer violations that may occur and the attackers.
Explain the financial impact and risks associated with cyber crime. Assessed in an
exam.
Describe how to prepare and defend against cyber crimes and information theft.
Examine the various roles of a consumer, user, employee, employer, service provider
(ISP) and the government in providing a secure computing/networking environment
. Course Organization
Ethics
Assets
Vulnerabilities
Privacy
Threats
Reconnaissance
Risk
Defense
Response
Grading:
Evaluation:
The guaranteed scale below is based on the
total percentage of points.
A: 90% - 100% points.