Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Systems Security Course Introduction.

Similar presentations


Presentation on theme: "Information Systems Security Course Introduction."— Presentation transcript:

1 Information Systems Security Course Introduction

2 Syllabus Key Points Syllabus Key Points Contact Information Course Description Student Learning Outcomes Course Agenda Textbook & Course Web Site Grading & Points Distribution Assignments Exams Late Policy Lab Use Email Accounts 2

3 Nature of the Course Non-technical Focus ◦ Terminology, concepts and practices related to information systems security Labs and Projects ◦ Allow you to experiment with different kinds of tools available. Homework Assignments & Reports ◦ Homework emphasizes key points and tasks based on reading assignments. ◦ Reports allow you to research additional topics related to information security. 3

4 Course Structure Project-based Design and develop network test beds Use test beds to try out different security methods and approaches Research-oriented Students will research and report on different aspects of security 4

5 Textbook & Other References Textbook Principles of Information Security, Third Edition, Michael E. Whitman and Herbert J. Mattord, Thomson Course Technology, 2009 - looks boring but is full of good advice Online References CERT web site:http://www.cert.orghttp://www.cert.org Other sites posted on course web site Other Useful References Getting Started with Linux: Novell's Guide to CompTIA's Linux+, Novell & Jason Eckert, Thomson Course Technology, 2007 5

6 Professional Work Habits and Ethics Professional Work Habits and Ethics Attendance and Punctuality Attentiveness ◦ No web browsing ◦ No side discussions Ethical Work ◦ Most assignments will be done in teams. ◦ Some assignments may be required to be completed individually. ◦ In all cases, turn in your own work and your own conclusions. Work Quality ◦ Neatness, organization and timeliness count in grading ◦ Especially important for project assignments and reports Behavior and Language ◦ Be respectful of other people. ◦ No cursing, vulgarities, racial slurs, sexual innuendos, or offensive jokes. 6

7 UH Smoking Policy  No smoking in classrooms or buildings  No smoking within 25 feet of doorways 7

8 Purges for Nonpayment Purges for nonpayment were made before classes start. ◦ If you were dropped and have not already done so, you must re- register for the course. ◦ Drop notifications were sent to your UH email address. There will be no more purges for nonpayment after the beginning of classes. ◦ If you do NOT want to take/pay for this class, you MUST drop it. It will not happen automatically. 8

9 HCC Wireless Access Information about HCC wireless access: ◦ http://www.honolulu.hawaii.edu/itc/hotspot/ http://www.honolulu.hawaii.edu/itc/hotspot/ Configure your wireless card using the ◦ HCC SSID and ◦ WEP or WPA2 key Log on to the HCC network using ◦ your HCC account username and ◦ You HCC account password Getting an HCC Account ◦ You should already have an HCC account if you took ICS 100 or ICS 101 at HCC ◦ Otherwise, go to the HCC Computer Lab in Bldg 2 Rm 405 9

10 Email Forwarding  The default email address in this course is the UH email address used in MyUH.  To configure forwarding your email to a different address:  Login to your email account via UH Webmail: https://mail.hawaii.edu/ https://mail.hawaii.edu/  Navigate to Options | Settings  Enter desired email forwarding address in the Mail Forwarding field.  Save changes and exit.  Note: HCC Administration will send official announcments to your UH email address. So, it's very important that you forward or check email sent to that account regularly. 10

11 Student Information  Introductions  Who you are...  What would you like to find out about information security?  Student Information Sheets  Questions? 11

12 Answers Partner exercise in class: Go through the book preface and pick out the most important advices from the author (who has 35 years of experience in security). Save this file in your dropbox, bc we will get to it later in the semester. Discuss your findings with your neighboring team. *Report your findings to the whole class. 12


Download ppt "Information Systems Security Course Introduction."

Similar presentations


Ads by Google