Usable Security Project
Western Illinois University
 
 
Welcome to Usable Security Education Project Home Page
  

Teaching Strategy


We introduced a new module on Usable Security by selecting and customizing relevant materials from cs395. The new module can be covered in two classes. We made the room for it by making some of the lighter materials (e.g., history, survey of computer crimes, legal issues) self study. We also designed a number of tasks to introduce Usable Security. We also applied the 3P method, whenever possible on discussing other security topics.

Topic Outline

Week 1 Introduction to Computer Security, Basics of Usable Security.
Week 2 Basics of Computer Networking, Internet Technology.
Week 3 Target System Assessment. Lab
Week 4 Denial of Service Attacks.
Week 5 Denial of Service Attacks
Week 6 Malware (Viruses, Worms, Trojan Horses)
Week 7 Securing Computer Systems, Human factors
Week 8 Review/Practice/Midterm.
Week 9 Encryption (Secret Key Cryptography)
Week 10 Encryption. (Public Key Cryptography), Lab
Week 11 Internet Fraud and Cybercrime, Phishing
Week 12 Industrial Espionage.
Week 13 Cyber Terrorism and Information warfare.
Week 14 Hardware and software for Computer Security. Basics of GUI design and development for Usable Security.
Week 15 Online record search, Open source information., Email/Website tracking, Lab, Usable Security Lab
Week 16 Final Examination and Assessment.

Top

 
 
 
 
Usable Security Education © 2008
Stipes 447I
Computer Science Department
Western Illinois University
1 University Circle
Macomb IL-61455
Western Illinois University Valid XHTML 1.0 Transitional Valid XHTML 1.0 Transitional National Science Foundation
 
 
 
 

This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.