Information Security
Fall 2022
Introduction and Course Policies
Tyler Bletsch Duke University
Instructor and TAs
2
• Muhammad Abdul Qayum
Course objective:
Evolve your understanding of security
• Theory:
 How do I think systematically about security?
 What constructs are available for me to use?
 How do I understand new threats and defenses not covered in the course?
• Skills:
 What tools are commonly used to do the above?
 How can I manipulate data and automate things to make the above practical?
• Practice:
 “Stick time”: Actually doing it.
 Both attacking and defending.
Security
Theory
Skills
Practice
3
Textbook
• Text: Computer Security: Principles and Practice (4th Edition), by
Stallings & Brown
ISBN 1-292-22061-9
If you go to addall.com, you can search all online booksellersat once.
4
Grading Breakdown
Marks %
Sessional 30%
Mid Exam 30%
Final Exam 40%
Partial credit is available – provide detail in your answers to seek it!
Late homework submissions incur penalties as follows:
• Submission is 0-24 hours late: total score is multiplied by 0.9
• Submission is 24-48 hours late: total score is multiplied by 0.8
• Submission is more than 48 hours late: total score is multiplied by the Planck constant (in J·s)
~6.6×10-34
!
5
Homework Zero
• Designed to get you familiar with UNIX in general and Linux in
particular
• UNIX skills are for more than this course – there’s a reason people
use these tools!
6
Academic Misconduct
• Academic Misconduct
 Refer to Duke Community Standard
 Homework content is individual – you do your own work
 Common examples of cheating:
• Copying and rephrasing written answers from another student
• Using code or answers from an outside source
• I will not tolerate any academic misconduct!
• “But I didn’t know that was cheating” is not a valid excuse
All artifacts you submit must be entirely your own.
7
Goals of This Course
8
• Things you will understand after this course:
 Fundamental security objectives: Confidentiality, Integrity, and Availability
 How to develop and describe a threat model
 The types of security threats and attacks that must be dealt with
 How to distinguish among various types of intruders and their behavior patterns
 The poor programming practices that cause many security vulnerabilities
 Major networking protocols, standards, and tools
 Symmetric and asymmetric cryptography including message authentication
 User authentication
 How to reason about and implement security policies
 How to secure operating systems, databases, hypervisors, and cloud environments
 The role of firewalls, intrusion detection, and intrusion prevention systems
 Security auditing and forensics
 Social engineering attacks
 Ethical and legal aspects of security
Ethics in Security
• There are three flavors of security practitioner in the world:
 White hat: Obey the law, work to make systems secure
 Black hat: Break the law, infiltrate (usually for profit)
 Grey hat: Does both (so still super unethical)
• There is ONE flavor of security practitioner in this course:
9
OBE
• What is OBE?
• Program Educational Objectives (PEOs)
• Program Learning Outcomes (PLOs)
• Course learning outcomes (CLOs) of this course and Taxonomy
levels involved
• Contribution of this course to PLOs and PEOs
• Course specifications and reference materials
• Number/type/marks of sessional activities
• Complex Engineering Problems
• Open Ended Labs (in case Lab is part of course)
• Assessment Methods and Evaluation Criteria
• Continuous Quality Improvement
• Expectations from Students in OBE
ASSESSMENT OF STUDENT BEHAVIOUR
1 The student maintains good personal hygiene.
2 The student maintains appropriate dressing.
3 The student demonstrates good time management.
4 The student demonstrates good communication.
5 The student demonstrates compliance with rules and regulations.
6 The student demonstrate integrity.
7 The student demonstrates consideration for others.
8 The student tries to make positive contribution.

More Related Content

DOCX
IS_Syllabus_4_credits_2018.docx
DOCX
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
PPT
Intro (1).ppt
PDF
TUD CS4105 | 2015 | Lecture 1
PPT
introduction to data science- University
PPT
Introduction to computer security syllabus
PPT
lecture1-adnaced network for bigginerrs students
PPT
Computer Security.ppt
IS_Syllabus_4_credits_2018.docx
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
Intro (1).ppt
TUD CS4105 | 2015 | Lecture 1
introduction to data science- University
Introduction to computer security syllabus
lecture1-adnaced network for bigginerrs students
Computer Security.ppt

Similar to 01-intro.pptx (20)

PPT
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
PPT
INT529 zero lecture.pptdsfsdffewwretetrtetretr
PDF
Ethical Hacking
PDF
CYBER SECURITY Enginnering course .pdf
PDF
ISA.pdf
DOCX
Residency ResearchISOL 536 Security Architecture and Design.docx
DOCX
IS_Front Pages-2024-2025.docxbhvghvhbhbu
DOCX
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docx
PDF
Concepts of Cyber Security lecture note.pdf
PDF
Course Slides for CS_6035_01_Security Mindset (1)
DOCX
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
PPT
intro_juhy_of _art_of _hacking_ekdoskw.ppt
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
PDF
COMP 424 Computer System Security Fall 2016
DOCX
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
PPTX
Get training in cyber security & place yourself in good companies through...
PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
PPTX
Untitled (1).pptx
PPTX
Untitled (1).pptx
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
INT529 zero lecture.pptdsfsdffewwretetrtetretr
Ethical Hacking
CYBER SECURITY Enginnering course .pdf
ISA.pdf
Residency ResearchISOL 536 Security Architecture and Design.docx
IS_Front Pages-2024-2025.docxbhvghvhbhbu
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docx
Concepts of Cyber Security lecture note.pdf
Course Slides for CS_6035_01_Security Mindset (1)
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
intro_juhy_of _art_of _hacking_ekdoskw.ppt
(eBook PDF) Information Security: Principles and Practices 2nd Edition
COMP 424 Computer System Security Fall 2016
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
Computer Securityyyyyyyy - Chapter 1.ppt
Get training in cyber security & place yourself in good companies through...
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Untitled (1).pptx
Untitled (1).pptx
Ad

Recently uploaded (20)

PPTX
formulation and evaluation of polyherbal antiageing cream
PPTX
Q1 Review Spoke Centre _ Project समर्थ (1) (1).pptx
PPTX
obstetric instruments for final year mbbs students
PPTX
SE-Unit-1.pptxmmmmmmmmmmmmmmmmmmmmmmmmnnnn
PPTX
CIRCULATION-WPS Office hijghi gjjgfty.pptx
PPTX
Unit 1- Introduction to Corporate Etiquettes
PPTX
OIP-Narrative-Presentation-1Dg2.pptxdjjdjsjsjsj
PPTX
CDI 2.pptx special crime investigation with legal medicine
PDF
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
PPTX
Digital Education Presentation for students.
PPTX
mathsportfoliomanvi-211121071838 (1).pptx
PDF
Acne presentation and homeopathy treatment
PDF
Result-BAMS-4th-Year-2016-Onwards-May-June-2025.pdf
DOCX
PRACTICE-TEST-12 is specially designed for those
DOCX
GIZ Capacity Building Requirements for ICT Department.docx
PPT
Woman as Engineer and Technicians in the field of Clinical & Biomedical Engin...
PDF
202s5_Luciano André Deitos Koslowski.pdf
PDF
IMPORTANT QUES CLASS 12.pdf english by Tania sharma
PDF
BPT_Beach_Energy_FY25_half_year_results_presentation.pdf
PPTX
DiagdndigsbskshsvsjsisDiarrheal Diseases-1.pptx
formulation and evaluation of polyherbal antiageing cream
Q1 Review Spoke Centre _ Project समर्थ (1) (1).pptx
obstetric instruments for final year mbbs students
SE-Unit-1.pptxmmmmmmmmmmmmmmmmmmmmmmmmnnnn
CIRCULATION-WPS Office hijghi gjjgfty.pptx
Unit 1- Introduction to Corporate Etiquettes
OIP-Narrative-Presentation-1Dg2.pptxdjjdjsjsjsj
CDI 2.pptx special crime investigation with legal medicine
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
Digital Education Presentation for students.
mathsportfoliomanvi-211121071838 (1).pptx
Acne presentation and homeopathy treatment
Result-BAMS-4th-Year-2016-Onwards-May-June-2025.pdf
PRACTICE-TEST-12 is specially designed for those
GIZ Capacity Building Requirements for ICT Department.docx
Woman as Engineer and Technicians in the field of Clinical & Biomedical Engin...
202s5_Luciano André Deitos Koslowski.pdf
IMPORTANT QUES CLASS 12.pdf english by Tania sharma
BPT_Beach_Energy_FY25_half_year_results_presentation.pdf
DiagdndigsbskshsvsjsisDiarrheal Diseases-1.pptx
Ad

01-intro.pptx

  • 1. Information Security Fall 2022 Introduction and Course Policies Tyler Bletsch Duke University
  • 2. Instructor and TAs 2 • Muhammad Abdul Qayum
  • 3. Course objective: Evolve your understanding of security • Theory:  How do I think systematically about security?  What constructs are available for me to use?  How do I understand new threats and defenses not covered in the course? • Skills:  What tools are commonly used to do the above?  How can I manipulate data and automate things to make the above practical? • Practice:  “Stick time”: Actually doing it.  Both attacking and defending. Security Theory Skills Practice 3
  • 4. Textbook • Text: Computer Security: Principles and Practice (4th Edition), by Stallings & Brown ISBN 1-292-22061-9 If you go to addall.com, you can search all online booksellersat once. 4
  • 5. Grading Breakdown Marks % Sessional 30% Mid Exam 30% Final Exam 40% Partial credit is available – provide detail in your answers to seek it! Late homework submissions incur penalties as follows: • Submission is 0-24 hours late: total score is multiplied by 0.9 • Submission is 24-48 hours late: total score is multiplied by 0.8 • Submission is more than 48 hours late: total score is multiplied by the Planck constant (in J·s) ~6.6×10-34 ! 5
  • 6. Homework Zero • Designed to get you familiar with UNIX in general and Linux in particular • UNIX skills are for more than this course – there’s a reason people use these tools! 6
  • 7. Academic Misconduct • Academic Misconduct  Refer to Duke Community Standard  Homework content is individual – you do your own work  Common examples of cheating: • Copying and rephrasing written answers from another student • Using code or answers from an outside source • I will not tolerate any academic misconduct! • “But I didn’t know that was cheating” is not a valid excuse All artifacts you submit must be entirely your own. 7
  • 8. Goals of This Course 8 • Things you will understand after this course:  Fundamental security objectives: Confidentiality, Integrity, and Availability  How to develop and describe a threat model  The types of security threats and attacks that must be dealt with  How to distinguish among various types of intruders and their behavior patterns  The poor programming practices that cause many security vulnerabilities  Major networking protocols, standards, and tools  Symmetric and asymmetric cryptography including message authentication  User authentication  How to reason about and implement security policies  How to secure operating systems, databases, hypervisors, and cloud environments  The role of firewalls, intrusion detection, and intrusion prevention systems  Security auditing and forensics  Social engineering attacks  Ethical and legal aspects of security
  • 9. Ethics in Security • There are three flavors of security practitioner in the world:  White hat: Obey the law, work to make systems secure  Black hat: Break the law, infiltrate (usually for profit)  Grey hat: Does both (so still super unethical) • There is ONE flavor of security practitioner in this course: 9
  • 10. OBE • What is OBE? • Program Educational Objectives (PEOs) • Program Learning Outcomes (PLOs) • Course learning outcomes (CLOs) of this course and Taxonomy levels involved • Contribution of this course to PLOs and PEOs • Course specifications and reference materials • Number/type/marks of sessional activities • Complex Engineering Problems • Open Ended Labs (in case Lab is part of course) • Assessment Methods and Evaluation Criteria • Continuous Quality Improvement • Expectations from Students in OBE
  • 11. ASSESSMENT OF STUDENT BEHAVIOUR 1 The student maintains good personal hygiene. 2 The student maintains appropriate dressing. 3 The student demonstrates good time management. 4 The student demonstrates good communication. 5 The student demonstrates compliance with rules and regulations. 6 The student demonstrate integrity. 7 The student demonstrates consideration for others. 8 The student tries to make positive contribution.