0% found this document useful (0 votes)
38 views10 pages

ITC183-Intro Cybersecurity-Levin-Spring2024-Syllabus

Uploaded by

sanxia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views10 pages

ITC183-Intro Cybersecurity-Levin-Spring2024-Syllabus

Uploaded by

sanxia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Computer Science Department

cs.salemstate.edu

Spring 2024
SYLLABUS

ITC183: Cybersecurity For the End Users 3.0 credits

--------------------------------------------------------------------------------------------------------------------------
Instructor: Benjamin Levin
Email: [email protected]
Office: Best – communicate online. Office: MH207D Phone: (978) 542-2835
Office Hours: Online by appointment
--------------------------------------------------------------------------------------------------------------------------

All classes will be held on Zoom according to the original schedule (“synchronously”):

Section Date Days Time Room Final


ITC183 Jan. 16 – May 2 WF 8:00 – 9:15 am On Zoom TBD

Please note:
• Detailed course class-by-class content, required readings, assignments/projects/labs/quizzes/exams, links
to additional multimedia materials will be on Canvas as always.
• Please now do diligently check your emails and course announcements. As always, I will update the file
“Course progress” on Canvas every week, so you all know where we are and what is ahead.
• Important: 30 minutes before the class I will send you the link to the Zoom meeting or Meeting
ID/Password.
• I will be taking attendance every class.

Catalog description:
How safe are you in the digital world? Hackers are trying to get access to your private information, to use your
identity and to impersonate you while conducting criminal activity, viruses are trying to destroy your computer. Do
you know how to protect yourself and the rules you must follow to make your digital universe safe? If not – this
course is for you. It provides an overview of computer and network security - one of the main issues, facing the
Internet community today. Computers worldwide are under attack by hackers, organized crime, and foreign
governments, with potentially disastrous results for individuals, organizations, and even states. This course presents
a user-level view of computer security and includes discussion of topics you must know to be safe as individuals
and future members of the work force, functioning in the global digital world.
Prerequisites: High school algebra I and II.
Forecast of Course Offering: Twice a year.

Course Narrative:
The overall purpose of the course is to foster an understanding of problems and solutions in computer and
network security and to prepare students to function in the global Internet world in a safe and secure fashion as
individuals and employees.

Students will learn fundamental principles of “Information Security” – what is it, what topics are covered by this
title, and why this issue is so important in the contemporary computing environment. Students will learn
fundamentals of computer architecture and networking from a security point of view. After that, students will
explore dangers that people face as members of World Wide Web as individual users and employees of companies,
Page 1 of 10
whose Information Technology environments protect the most valuable asset they have – information.

After students understand fundamental concepts of Information Security, they will learn particular methods and
tools that are used to analyze their computer environment from a security point of view, rules of proper behavior in
the digital world, and policies and procedures, employed by companies to protect their IT environments. Students
will learn about hackers (who they are and why they do what they do) and their methods – from purely technical
tools that exploit vulnerabilities of IT environments to non-technical methods of information gathering (such as
“social engineering”). Doing assignments students will have a chance to use simple tools that will enable them to
protect data, evaluate security of their systems and Web services they use, analyze possible threats, learn rules of
proper behavior on the Internet, and minimize their footprint and visibility on the Internet. Knowledge of security
mechanisms and tools is not restricted to PCs/Laptops, but also includes smartphones (mobile computing security).

Course Goals:
Upon completion of this course, students will:
CG1: Develop an understanding of basic principles of computer and network security;
CG2: Describe security issues facing users and mechanisms/tools used to improve computer and network
security;
CG3: Become familiar with computer and network security assessment methods;
CG4: Become familiar with rules of proper behavior in the digital world (as individual and employee);
CG5: Develop an understanding of organizational methods used by companies to ensure security of their IT
infrastructures;
CG6: Develop an appreciation for the complexity of the Information Technology security infrastructures,
employed by companies;

Course Outcomes (Objectives):


Upon completion of this course, a student will be able to:
O1: Apply correct technical terminology to name and describe main issues and solutions in information
security;
O2: Demonstrate clear understanding of computer and network security issues faced today by individuals
and companies;
O3: Apply trouble-shooting techniques and skills to solve real life security problems (user-level);
O4: Demonstrate the ability to analyze security vulnerabilities of computers and networks;
O5: Demonstrate understanding of rules of proper behavior and ability to use technical tools and
administrative procedures, necessary to preserve security (as an individual user and a member of an
enterprise’ IT infrastructure);

Table of contents:

Part 0. Introduction into Cybersecurity


Chapter 0A. What is Cybersecurity
What is cybersecurity
Why cybersecurity is important
An end-user’s view of cybersecurity
Chapter 0B. Hackers and hacking
Hackers – who are they, types, how they work
Hacking process (methods, techniques, tools)
Social engineering
Penetration testing
Are hackers good, bad or necessary?
Chapter 0C. Ethical issues in cybersecurity

Part I. Computer Architecture and Security


Page 2 of 10
Chapter 1A. Computer Architecture
Hardware (physical) model
Software (logical) model
Control and data flow through a computing system
Types of computer systems
Chapter 1B. Data storage
Data storage model
Evolution of data storage
Chapter 1C. Programming, software, etc.
Problem solving and algorithms
How an algorithm becomes a program
How a program becomes an instruction set
Software security
Chapter 1D. Platform security
Cryptography
Private key (symmetric) encryption
Steganography
Controlling user’s access to computing resources
Securing data on storage devices
Disaster recovery procedures
Protecting runtime environment

Part II. Networking Fundamentals and Security


Chapter 2A. Networking Fundamentals
Networks – a model (circuit switching vs. packet switching)
Networks – implementation (LAN vs. WAN, protocols, addressing)
Domain Name System (organization and security)
Chapter 2B. Network Security
Security of data in motion (public key encryption)
Secure communications (PKI and certificates)
Virtual Private Network
End-to-end security
Security of the Cloud storage
Chapter 2C. LAN security administration
Securing the router
Filter incoming and outgoing traffic
Wireless security
Securing LAN

Part III. World Wide Web Architecture and Security


Chapter 3A. World Wide Web Architecture
Web client-server architecture
Web control and data flow
Website architecture and Web content
Webpages identification and access
How to build a website
Chapter 3B. World Wide Web Security
Server-side and client-side security
Dynamic Web content and vulnerabilities of dynamic webpages
Website security (verification)
Secure web connections
Peer-to-Peer security
Page 3 of 10
Decentralized Web
The human factor

Part IV. Personal Security


Chapter 4A. Metadata
What is metadata
Metadata and security
Metadata tools
Chapter 4B. Invisibility
What is Internet anonymity and how to achieve it
Physical vs. digital identity and a Big Brother
Different ways to stay invisible (proxy, VPN, E2EE, Tor world)
Chapter 4C. Mobile security and anonymity
Protecting your mobile computing environment
Things end users do not know or neglect to do
Your Wi-Fi might betray you
How secure is your mobile device?
Security of messengers
Mobile applications security?
Chapter 4D. Email security and anonymity
How email works
Anonymous email
Email apps vs. Webmail confidentiality
Email Authentication

Part V. Digital Forensics (DF)


What is DF profession and why do we need it?
Types of DF
DF Investigators and DF process
Legal side of DF profession

Part VI. Special topics in Cybersecurity


Encryption issues in Cloud computing
Quantum computing and global security problem
Artificial Intelligence and Cybersecurity
Blockchain and how it can be used for data security

Student Experiences:
The emphasis of the course is on the understanding of the issues in Information Security and experience in usage of
security tools and mechanisms, necessary to individual users and employees. Extensive laboratory exercises will
involve use of these tools and mechanisms in order to minimize security threats to individuals and companies.
Students will be encouraged to do independent analysis of different environments (for example their home networks)
and design methods of dealing with security problems. There will be individual and group projects teaching students
to analyze real cases of security breach and deal with security issues presented by different scenarios. Especial
attention will be paid to importance of Information Security for future employees.

Expectations for course-related work outside of standard class meeting times


Students enrolled in this three-credit course should expect to invest approximately three hours per week
in class attendance and approximately six hours per week of course-related work to be completed outside

Page 4 of 10
of class meetings. Each student is responsible for completing all course requirements and for keeping up
with all that goes on in the course (whether or not the student is present).

Assignments:
Given weekly (approximately), assignments require students to use information given during the lectures and may
need to refer to the lecture slides, textbook, and/or perform Internet research for necessary materials. Each
assignment has a specific due date, with a short grace period during which the assignment may be submitted for
reduced credit. When the grace period has expired, the assignment will no longer be accepted, and a student who
has failed to submit the assignment will have a penalty deducted from the term point-total. Other than the labs,
there will be homework, quizzes, midterm, and a final.
Tools: Through the use of software tools (applications downloaded from the Internet), you will exercise
theoretical principles discussed during the lectures through practical hands-on exercises.
Reports: Assignments will result in Reports, submitted through Canvas. Follow the guidelines (if any) provided
by the instructor for writing the reports.
Presentations: I want each one of you to make a presentation on one of the topics that I find interesting; there is a
list of topics and you will be able to choose from the list.

Student Experiences by Course Outcome (Objective) matrix:


student outcome / experience O1 O2 O3 O4 O5
exam questions ✓ ✓ ✓ ✓
homework problems ✓ ✓ ✓ ✓
project reports and deliverables ✓ ✓
lab exercises ✓ ✓ ✓ ✓ ✓
group projects ✓ ✓ ✓ ✓ ✓
presentations ✓ ✓ ✓

Organization of the course


There are 2 lecture-hours a week. A lecture-hour could be either a lecture or a lab (partial). Labs include
research on chosen topics, analysis of computing environment from a security point of view, usage of simple
software tools to improve security of computers and networks. You will have access to the content of all
lectures through Canvas that include my lectures and links to Internet articles that best describe what we learn
(this is your free textbook) and these materials will be your “required reading”.

Required technical resources


Labs will be conducted in your home LANs. Software tools, used to analyze computer and network security,
are free and will be downloaded from the Internet.

Course Schedule
This course is online synchronous, i.e. we will meet on Zoom according to schedule (please, learn how to
download, install, and use Zoom application). I will send an email with meeting invitation about 30 minutes
before the start of each meeting. There is a file in the first module on Canvas called “Course progress”. Every
course runs slightly differently and so that you can see where we are at every moment, I will edit this file
every couple of weeks.

Course Management:
• Course Login (Canvas): http://elearning.salemstate.edu
• Communicating with the Instructor:
To communicate with me PLEASE USE [email protected]. You will get response from me as soon as
I can handle all the emails I get (in a day or two). YOU MUST start the Subject line with “ITC183”

Page 5 of 10
and your name (how it is recorded on Canvas) because I have more than one course and your email name
does not always make it clear who you really are.
• Zoom invitation:
You will receive invitations to Zoom meetings (classes) in your SSU Email about 15 minutes before each
class begins.
• After the class:
After the class you will receive an email from me with:
o What we did today in class
o What is your assignment
• Syllabus:
Please read the entire course syllabus. Many inquiries at the beginning of the course usually contain
questions already covered in the syllabus. If you don’t understand something in the syllabus, please send
me an email asking for clarification.

Course Participation:
Each student is responsible for completing all course requirements and for keeping up with all that goes on in the
course (whether or not the student is present in class), as well as making sure coursework is properly submitted for
grading. It is student’s responsibility for submitting the coursework on time, properly, and making sure his/her
submissions were accepted and graded. Throughout the semester, please check and double check to make sure you
have completed the coursework. Any missing, late, or incomplete coursework, or coursework not submitted,
would be assigned grade of ZERO unless you communicated with me beforehand.

Student’s Zoom Code of Conduct:


• I will be actively engaged in the Zoom classroom experience. In this course, having my video on is a
requirement for active engagement in the classroom, which means that I will have a camera and have it on
while in class. IF I DO NOT SEE YOU – YOU ARE NOT IN CLASS (unless you warn me about an
issue).
• I understand that all the lectures and discussions in this course may be recorded and published online as a
resource. By remaining enrolled in this course, I consent to participate in recordings of the classroom
experience.
• I agree that I will not clip, reproduce, or distribute any aspect of the recorded classroom experience. I
understand that if I violate this agreement, I may be withdrawn from the course with a grade of F.

Testing and grading


There will be home works, simple quizzes, and two exams – midterm and final. Students will be given weekly
assignments, which will mostly consist of solving problems related to the material covered in that week’s
class. The final grade will be determined according to the following formula:

Grading (preliminary, subject to change):


Assignment Points
• Home assignments (2) 16 8 each
Extended labs that require specific access to your computer and home network. Will be started in class
and continued at home.
• Research papers (2) 16 8 each
Each assignment will require doing some Internet research on a given topic in security and writing a
comprehensive report.
• In class labs (4) 16 4 each
In each lab you will follow step-by-step instructions given by the instructor and will write a brief report
about your actions (what you did, what you find out, etc.)
• Required reading quiz (12) 36 3 each

Page 6 of 10
Most Chapters have “required reading” material and after each Chapter there will be a quick simple quiz
to test your understanding of the material. Each quiz will consist of 8 questions (True/False, Multiple
choice, Fill blanks, etc.)
• Exams (2) 16 8 each
The Midterm exam will cover Parts I and II, the Final Exam will cover the whole course.
--------------------------------------------------------------------------
Total 100 points (100%)

Note, that each course progress is slightly different, it depends on how many students are in class, how well
they understand computers and how diligent are they in doing assignments. As a result, the total number of
points might change slightly (for example, there might be less then 12 quizzes) but, of course, the total
number will always be 100%. To help you, on Canvas I will keep a file called “Course progress” which I will
update every week so that you will always know where are we in the course.

Students will be able to pick up additional points (to compensate for missing grades) doing presentations on
subjects provided by the professor (5 point each) and the course analysis report paper.
All students should expect to invest approximately three hours per week in class attendance and
approximately six hours per week of course-related work to be completed outside of class meetings.

The numeric final grade will be converted to a letter grade based on the following grading system adopted by
the college. This letter grade will be submitted as the official grade for the course.

Final Average Letter Grade


93-100 A
90-92 A-
87-89 B+
83-86 B
80-82 B-
77-79 C+
73-76 C
70-72 C-
67-69 D+
63-66 D
60-62 D-
0-59 F

Main resources:
• Canvas website with lecture-by-lecture topics, quizzes, assignments, and exams.
• No textbook

Use of Electronics
Do not forget to turn off your cell phones! Text messaging, wearing headphones and loud conversations are
considered disruptive behaviors and will be handled in accordance with the University policy. The use of
portable electronic devices, i.e., laptops, tape recorders, and cameras, is not permitted at any time during the
class (!).

Class Attendance: (required)


I take attendance very seriously, especially now, when we meet only online and I have much less control over
what do you do while in class. This technical knowledge is complex, and it is “layered”, with each next layer
based on the previous one. In this class we put in the foundation. The more you miss, the harder it will be to
get back on track. I WILL take attendance every class. We have about 15 weeks, 2 classes/week ~ 30 classes.
Attendance effect on grading:
Page 7 of 10
a. Up to 3 absences – 0 penalty (notifying me)
b. 4-6 classes missing – 0.3 points is deducted from your Total grade for each missing class
c. More than that – withdraw or Fail or we need to discuss what is going on and I will make an
effort to help you with completing all the coursework.
d. Family emergence of illness – TALK TO ME!!!
Please understand,
In online classes seeing you, my students, on the camera, is the ONLY way left to me to be able to judge
your reactions and have some idea whether you understand my explanations. Everybody MUST be on
camera at all times. Occasional problems with electronics can happen (tell me about it if this happens) but
normally you MUST be on camera or you are not in class (see “attendance” rules). If you need to live
earlier – let me know.
Lectures are absolutely required. Assignments just augment messages. Even if you completed all the
assignments but do not meet attendance criteria and “on-camera” policy, you will fail the class. Any
student who is regularly missing classes MUST talk to me and explain the situation. Just sending me
an email after long absence does not count! Points will still be deducted even if you completed all the
assignments. LECTURES ARE ESSENTIAL!!!

In the cases where a grade is “on the line” attendance may be used to determine whether the student put effort
into the course or not. Because almost every class includes lecture and assignments are graded, attendance can
be translated into grades. Each student is responsible for completing all course requirements and keeping up
with all what is goes on in the course whether or not the student is present.
Each student is responsible for completing all course requirements and for keeping up with all that goes on in
the course (whether or not the student is present).

Missed Exams:
Missed tests/quizzes/exams will be made up as soon as it is humanly possible. The student is responsible for
notifying me that he/she will miss a test/quiz and make arrangements for make-up. I will allow a student to take
missed exam later but only in case of really serious circumstances.

Final Exam Policy


The final exam will be given synchronously online according to schedule. Refer to the top section of this
document for due date information. This exam will be available and administered through Canvas during final
exam period. Failure to complete this exam will result in a grade of 0% (zero) on the exam.

Most important: ALWAYS talk to me if you have troubles in understanding the material or personal
issues! I will do whatever I can to help and accommodate your needs. If you do not talk to me (or just
disappear for a prolonged period of time) I will automatically apply the rules.

Bibliography:
References:
• Mark Ciampa. Security+ Guide to Network Security Fundamentals. Course Technology, 2008
• Shon Harris, Gray Hat Hacking. McGraw-Hill Osborne Media, 2007
• H.X. Mel and Doris Baker. Cryptography Decrypted. Addison-Wesley Professional, 2000
• Bruce Schneier, Secrets and lies: Digital Security in a Networked World. John Wiley and Son, 2004.
• Kevin D. Mitnick. The Art of Intrusion, 2004
• Kevin D. Mitnick. The Art of Deception, 2005

Software Tools and Web Resources:


• System tools (part of the operating system)
• Encryption applications MEO
• ShieldsUp! open port analysis tool www.grc.com
• Network security lectures http://www.cis.ufl.edu/~nemo/security/

Page 8 of 10
• Safe Browsing AP http://googleonlinesecurity.blogspot.com/2008/05/safe-browsing-diagnostic-to-rescue.html
• Internet articles about security multiple links

Academic regulations:
All students are expected to be familiar with the academic regulations, including those regarding Academic
Integrity, for Salem State University as published in the college catalog. In addition, each student is responsible
for completing all course requirements and for keeping up with all that goes on in the course (whether or not the
student is present).

“Student” technology failure does not constitute a declared critical emergency at Salem State. However, I
know it is considered “critical” to you so have a backup plan for completing course requirements and labs. Get to
know where the open access computer labs are on campus. Be prepared to go to these labs if your “crisis” is
occurring on or near a due date! Lost files? Well, the content matter for this course is “computing.” You will
NOT have the excuse you lost your files or USB drive because you will have a backup plan in effect at all times
during the semester so you can produce all files if needed at any time during the semester.

Equal access:
Salem State University is committed to providing equal access to the educational experience for all students in
compliance with Section 504 of The Rehabilitation Act and The Americans with Disabilities Act and to providing
all reasonable academic accommodations, aids and adjustments. Any student who has a documented disability
requiring an accommodation, aid or adjustment should speak with the instructor immediately. Students with
Disabilities who have not previously done so should provide documentation to and schedule an appointment with
the Office for Students with Disabilities and obtain appropriate services.

Covid-19 pandemic statement:


Students must comply with any University Health and Safety Protocols for the current academic term. Students
should review the updated Covid-19 information found at https://www.salemstate.edu/covid19."

Final Exam Policy


The final exam will be given online. Refer to the top section of this document for due date information. This exam
will be available and administered through Canvas during final exam period. Failure to complete this exam will
result in a grade of 0% (zero) on this exam.

Important Academic Dates


The academic calendar contains information and dates for many academic related activities, such as “Add/Drop
Period Ends,” “Last Day to Withdraw from Full Semester Course,” etc. Please refer to this calendar throughout
the semester to ensure that you don’t miss important dates. The academic calendar for the 2021 academic year can
be found online at: https://www.salemstate.edu/academic-calendar

To officially withdraw from this course, you MUST fill out the appropriate withdrawal form and file it with the
Registrar by the deadline specified in the academic calendar. If you officially drop this class on or before the
deadline, you will receive a "W" indicating withdrawal on your transcript. Unofficial withdrawal (not attending,
without filing an official drop form with the Registrar's office by the withdrawal deadline) would result in a grade
of "F."

Academic Integrity Policy


All students are expected to be familiar with the academic regulations, including those regarding Academic
Integrity, for Salem State University as published in the college catalog. In addition, each student is responsible
for completing all course requirements and for keeping up with all that goes on in the course (whether or not the
student is present).

Page 9 of 10
Emergency:
In the event of a university declared critical emergency, Salem State University reserves the right to alter this
course plan. Students should refer to salemstate.edu for further information and updates. The course attendance
policy stays in effect until there is a university declared critical emergency. In the event of an emergency, please
refer to the alternative educational plans for this course located at/in [faculty member determines this. Students
should review the plans and gather all required materials before an emergency is declared.

Please remember that if, for any reason, you decide to drop this course, you MUST do so officially through the
Registrar's office. The last day to withdraw from a course this semester is tbd.

Note: This syllabus represents the intended structure of the course for the semester. If
changes are necessary, students will be notified in writing and via all regular class
communication mechanisms. It is the student’s responsibility to attend the class and be aware
of changes in course requirements.

Page 10 of 10

You might also like