Professional Documents
Culture Documents
CSCI262 Autumn2013 Lectures Csci262-Fall2013-Subject-Outline PDF
CSCI262 Autumn2013 Lectures Csci262-Fall2013-Subject-Outline PDF
2 LEARNING OUTCOMES
Upon successful completion of this subject, a student should be able to:
(a) Analyse risks and threats to computer systems.
(b) Evaluate and manage the security in computer systems.
(c) Apply models of security in Operating Systems and select methods for providing protection.
(d) Apply security mechanisms in database management systems.
(e) Manage security for mobile code systems.
3 SUBJECT SCHEDULE
Related
Lecture Topic(s) Text
week starts ends Chapter(s)
1 15-Sep 19-Sep Introduction, Foundation of security, security policy 1,2
2 22-Sep 26-Sep Authentication, Access control. 3,4
Trusted computing and multilevel security, security
13
3 29-Sep 3-Oct models, common criteria
4 5-Oct Database system security. 5
lab october
Intrusion detection systems, firewalls. 8
5 6-Oct 10-Oct 12
13-Oct 17-Oct Break
6 20-Oct 24-Oct Malware, Reverse engineering & obfuscation. 6
7 27-Oct 31-Oct Denial of service attacks, protection methods. 7
8 3-Nov 7-Nov Buffer overflows, secure code, cross-site scripting. 10
9 10-Nov 14-Nov Other software security issues, revision. 11
10 17-Nov 21-Nov Phishing, auditing. 18
11 24-Nov 28-Nov Linux security / Windows security 12
12 1-Dec 5-Dec Security of Mobile code Notes
13 8-Dec 12-Dec IT security mgt, risks, controls 14
14 15-Dec 19-Dec Break
15 22-Dec 26-Dec Break
16 29-Dec 2-Jan Break
17 5-Jan 9-Jan Exams
18 12-Jan 16-Jan Exams
4 TEXTS
4.1 REQUIRED TEXTS
William Stallings, Lawrie Brown, 2nd edition, 2011, Computer Security: Principles and
Practice, Prentice Hall
Required texts can be purchased from the University Bookshop located in Block 5 Ground
Floor.
COPYRIGHT NOTICE: The University of Wollongong in Dubai complies with UAE Federal Law No. (7)
of 2002 pertaining to Copyrights and Neighboring Rights. Severe penalties apply for copyright
violations. No copied materials will be allowed on campus, except where permitted as per UAE Federal
Law No. (7) of 2002. Any copied materials that violate UAE Laws or UOWD Policies will be
confiscated in the first instance and disciplinary actions may be taken against the person(s) involved.
4.2 RECOMMENDED READINGS
Carlos Solari, 2009, Security in Web 2.0 + World: a standards based approach, John
Wiley and Sons
Charles Pfleeger, 4th edition, 2007, Security in Computing, Prentice Hall
Cole, Krutz, Conley, Reisman, Ruebush, Gollmann, Reese, 2008,Wiley Pathways
Network Security Fundamentals, John Wiley and Sons
Davi Ottenheimer, 2012, Securing the virtual environment: how to defend against
attack.
Dieter, Gollmann, 3rd Edition , 2011, Computer Security, John Wiley and Sons
Dwayne Williams, Principles of Computer Security: Security+ and Beyond, Mc Graw
Hill
Gary M. Jackson, 2012, Predicting Malicious Behavior: Tools and Techniques for
Ensuring Global Security, John Wiley and Sons
All of the recommended readings above are available at the UOWD Library located on the
first floor in Block 14.
(a) Analyse risks and threats to Tutorials and practical exercises, final exam
computer systems.
(b) Evaluate and manage the security in Lab assignments, Tutorials and practical exercises, final
computer systems. exam
(c) Apply models of security in Operating Tutorials and practical exercises, final exam
Systems and select methods for
providing protection.
(d) Apply security mechanisms in Tutorials and practical exercises, final exam
database management systems.
(e) Manage security for mobile code Lab assignments, Tutorials and practical exercises, final
systems. exam
MARKING CRITERIA
Exam will be marked on correctness and clarity of answers
Students must ‘reasonably’ complete all assessment tasks (including the required score for
the Final Examination,) and submit these as specified in the subject outline. ‘Reasonable’
8 PLAGIARISM
Plagiarism is a serious offense that can lead to expulsion from the university. Students must
be familiar with the Plagiarism policy which outlines the procedure that will be followed in case
of plagiarism. For more information please refer to the Plagiarism policy available on the
Student Online Resources website (http://my.uowdubai.ac.ae– follow the Policies link).
8.1 TURNITIN
In addition to a hard copy, students are required to submit all written assignments in soft
copy through the TurnItIn system which is available online at www.turnitin.com. Every student
must have a TurnItIn account. Failure to submit an assignment through TurnItIn will result in
marks for that assignment being withheld. Students do NOT need to hand in a printed
copy of the TurnItIn Originality Report! More information about TurnItIn (including how to
create an account and add a class) will be provided in the first lecture. Students can
Class ID:
Password:
8.2 REFERENCING & IN-TEXT CITATION & UOWD RULES & POLICIES
For information about Referencing and In-Text Citation, as well as a guide to some of the
UOWD Rules and Policies, please go to the Student Online Resources website
(http://my.uowdubai.ac.ae) and click on the POLICIES link. You will find the required
information under the letter “S” for “Subject Outline Information”.
9 ATTENDANCE REQUIREMENTS
For all subjects, include this statement:
Attendance in this subject is compulsory. Failure to attend all tutorials and computer labs as
per the Student Attendance Policy may result in a FAIL grade. Students are strongly
encouraged to become familiar with this policy (which can be found on the Online Resources
website at my.uowdubai.ac.ae).
11 SUPPLEMENTARY ASSESSMENTS
A supplementary assessment may be offered to students whose performance in this subject is
close (45-49 or TF) to that required to pass the subject, and are otherwise identified as meriting
an offer of a supplementary assessment. The precise form of a supplementary assessment will
be determined at the time the offer of a supplementary is made.