In this module we'll introduce terms and establish foundational information needed to understand future modules.
Module Concepts: Computer security defined; information assurance defined; basic verbiage; the CIA triad; risk management and controls; threats and vulnerabilities
Now that we've established what computer security is, we will continue with our foundational work by exploring the three basic tools of computer security.
Module Concepts: Authentication, Access Control, Basic Cryptography
Module Concepts: Buffer overflows, malware, and counter measures
A security engineer must understand the inner workings of what they need to protect. In this section we will examine operating systems, what they need to do, and where their weak points are at.
This module will explore a very big topic. I expect it will take at least two weeks and thus, I've divided it up into three parts. Take your time getting through this section. Network security is a complex problem and a huge part of the information assurance field.
Databases make up the backbone of most businesses now. So, it is only natural that we take the time to explore issues specific to databases and they are more complex than you might think.
For this module, we'll explore three interesting but less technical topics. I'm also going to give you a break this week from lab assignments. Focus on making progress on your deep dive.
The counter part to privacy is digital forensics. Let's explore that deeper, along with computer crime in general. We'll skip the lab assignment this week as well. Make some progress on that deep dive. I'm excited to see what you do.