NETWORK SECURITY
SYLLABUS
Instructor: Dr. Tom O'Connor or assigned instructor
This is a "master" syllabus and may not be your actual syllabus
Assigned instructors may or may not use this material

Class meets: as scheduled
Office hours: as announced
APSU Center @ Ft. Campbell
Telephone: (931) 221-1477, (931) 221-1493 (Fax)
Email: oconnort@apsu.edu
Website: www.drtomoconnor.com

Textbook: Moore, Robert. (2011). Cybercrime: Investigating High-Technology Computer Crime. Cincinatti: Anderson. ISBN: 978-1-4377-5582-4. Note: this is a NEW book adoption starting the Spring terms of 2011.

COURSE DESIGNATION: CRJ 3100 Network Security (3 semester hours)

COURSE DESCRIPTION AND PREREQUISITES: This course involves an intense examination of network security defense techniques and countermeasures with defense fundamentals explained in great detail. Topics include network defense techniques such as designing firewall systems and IDS, configuring firewalls, VPNs, trojan port numbers, and security related RFCs. (no prerequisites)

COURSE OBJECTIVES:

1. To acquire an understanding of network security and its changing character
2. To understand how network security is conceptualized and carried out
3. To examine the historical evolution of network security
4. To analyze both early and contemporary threats to network security
5. To articulate informed opinion about issues related to network security
6. To identify and investigate threats to network security
7. To appreciate the challenges of network security

GENERAL EDUCATION GOALS:

In addition to the above objectives, the more general goals of this course are to provide the student with the following tools to help develop his or her potential:
1. Development of the student's analytical thinking capabilities through comparison and contrast in the application of theories and concepts to social problems
2. Enhancement of the student's literacy skills through assigned readings, discussions, examinations, and other requirements
3. Utilization of the historical perspective which helps with student understanding of evolutionary developments over time
4. Understanding of the scientific method through research requirements and in-depth case studies
5. Improvement in social interaction skills and understanding human behavior through consideration of the impact legal and social systems have on individuals
6. Increased student awareness of cultural and multi-cultural issues through study of how social problems and social movements are related to, and affect, minority groups
7. Preparation for more advanced study in criminal justice/homeland security

CONTENT OUTLINE:

Week 1: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
1. Network Security Overview
1a. Introduction to Critical Infrastructure Protection (from Managing Incidents course)

Week 2: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
2. Risk Analysis Theory and Practice
2a. Eavesdropping and Wiretapping (from Con Law course)
2b. Informants and Surveillance

Week 3: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
3. Cyber Crime and Cyber Criminals
3a. Privacy and Cyberspace Law (from Con Law course)

3b. Privacy and Information Operations

Week 4: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
4. The Modus Operandi of Hacking
4a. Cyberterrorism and Cybervigilantism
4b. Cyberterrorism Threat Spectrum (from Terror Understanding course)

Week 5: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
5. Algorithm Security

Week 6: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
6. Application Software Security Land-Based Networks
6a. Application Software Security Wireless Networks
6b. Systems Software Security

Week 7: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
7. Intrusion Detection, Incident Response, and Integrity Control
7a. Malware, Spyware, Riskware, and Spam

7b. Identity Theft and Consumer Profiling (from WCC course)

Week 8: Textbook chapters as announced, the following (recommended) Lecture Notes, and any other material the Instructor assigns.
8. Disaster Data Recovery and Computer Forensics
8a. Advanced Digital Forensics

REQUIRED LEARNING RESOURCES:

Main Textbook/Required Textbook: Moore, Robert. (2011). Cybercrime: Investigating High-Technology Computer Crime. Cincinatti: Anderson. ISBN: 978-1-4377-5582-4

Supplemental Reference: American Psychological Association. (1994). Publication Manual of the American Psychological Association, 5e. Washington DC: APA. Note: students do not have to buy this book, but should have access to it or something similar in order to utilize the correct style or format with writing assignments.

Additional Learning Resources (Internet Links in lectures and these general resources)
Avi Rubin's Courses on Network Security
Computer Forensics and Steganography Resources
Computer Forensics World
DOJ Cybercrime Bureau
Dorothy Denning's Home Page
Fred Cohen's Home Page
Free Network Security eBooks
Georgia Tech Course on Network Security
InfoWar
InfraGard
MIT OpenCourseWare: Network and Computer Security
MIT Paper on Security Problems with Internet Architecture (pdf)
Portland State Univ. Course on Network Security
SANS
SC Magazine
Security Focus
Univ. of TN Course on Computer and Network Security

Virus Wildlist
2600: The Hacker Quarterly

COURSE REQUIREMENTS:

Students are expected to read and follow the schedule in the course syllabus, to read assigned text chapters, to read assigned Lecture Notes, and to seek and read additional suggested resources as provided by the textbook and Instructor.  In addition, students are expected to be alert and attentive with note taking in class and have a demonstrated desire to participate in any discussion.  Exams are to be completed within the deadlines given by the Instructor, and any special instructions for the paper and/or writing assignment(s) are to be followed precisely.  The Instructor will announce all deadlines and instructions as well as provide reminders about the pace or flow of the course.    

BASIS AND METHODS FOR GRADING: (May vary by instructor):

25% Midterm Examination (objective test with essay questions that may count toward writing)
35% Final Examination (objective test with essay questions that may count toward writing)
25% Writing assignments (single or multiple assignments, the equivalent of 8 pages)
15% Participation and Discussion (attendance, logins, discussioncontributions)

The grade scale used in this course is normally a 7-point scale, as follows, although instructors are free to make adjustments or modifications as circumstances permit. At times when circumstances permit, the scale may be dropped to a 10-point scale, or slightly more.

A = 93-100
B = 86-92
C = 78-85
D = 70-77
F = 69/below

ATTENDANCE POLICY: An attendance roster is kept (and login records, if this is a web-based course), and students are expected to attend all sessions on time and as expected. If a session and/or assignment deadline is to be missed for circumstances beyond the student's control, prior permission of the instructor must be obtained, and arrangements made for submission of the work. Regular late submission of work as well as tardiness and absenteeism will result in reduction of the final grade by at least one letter, depending upon severity. An "Incomplete" can only be given if the student has normally completed at least half the coursework, has a reasonable justification, and makes arrangements with the instructor.

DISABILITY POLICY: Any student who has a disability that may affect his/her academic performance is encouraged to make an appointment with me to discuss this matter, or you may contact Disability Services; telephone 221-6230; voice 221-6278; voice tty.

POLICY ON MINORS: Minors (any non-student under the age of 18) accompanying staff, faculty, students, or visitors on campus are not permitted in the classroom.

ACADEMIC AND CLASSROOM MISCONDUCT: Students are expected to conduct themselves appropriately at all times. Academic and classroom misconduct will not be tolerated. Students must read the "Code of Student Conduct" in the new Student Handbook for an understanding of what will be expected of them within the academic setting. Cheating and plagiarism will not be tolerated, and any student found cheating or plagiarizing will receive an "F" for the work in question, and possibly an "F" for the course, and may be recommended for suspension from the University.  Cheating is defined as not working on exams or assignments alone, and plagiarism is defined as taking the work of someone else's as one's own.  APSU uses software that will identify plagiarism.

The above schedule and procedures are subject to change in the event of extenuating circumstances.

Last updated: Apr 07, 2011
Not an official webpage of APSU, copyright restrictions apply, see Megalinks in Criminal Justice
O'Connor, T.  (Date of Last Update at bottom of page). In Part of web cited (Windows name for file at top of browser), MegaLinks in Criminal Justice. Retrieved from http://www.drtomoconnor.com/rest of URL accessed on today's date.