L Jean Camp
Scheduled for Fall 2007
Wednesdays 4:00 - 5:15
Informatics Room 107
Office Hours
Informatics Building 200
Mondays 3-5pm
Wednesdays 2-4pm
Grading Guidelines
40%
class participation
in class and on on-course participation are both counted.
60%
weekly essays
due every week
Participation in the classroom and in the discussion area in On-Course are both credited. If you are more comfortable speaking than writing, or more comfortable writing as opposed to speaking, you may choose only one. Participation should illustrate that any assigned reading has been complete, or when there are no readings that the course presentation was carefully watched. Participation professional in tone will not be counted as a positive contribution. To be perfectly clear, any student who diminishes the contributions of less advanced students will find his or her own grade suffers.
In terms of the weekly writing, each week there is a 300 word commentary on the lecture. The commentary may be a summary, or a comment, or you may ask a question, or you may connect the lecture to some current event. The commentary must illustrate awareness (to be passable) and understanding (to be excellent) of the lecture materials. Grammar and spelling count.
Schedules
Notice all of these sessions cannot fit into one semester. However, these examples of past sessions illustrate the possible diversity of the lecture
Oct. 24 Peer Production of Security
Jean Camp, Associate Professor of Informatics
The best deterrant to crime is public view. Are you ever in a crowd on-line? How can a group of naive people create reliable information about security?
Oct. 31 Ubiquitous Security
Professor Kay Connelly, Associate Professor, Computer Science.
As computers become as ubiquitous as lighting, can privacy be maintained?
Nov. 7 Cryptography
Steve Myers, Assistant Professor, Informatics.
The mastery of mathematics meant millions of lives saved in WW II. Today it means billions of dollars in Internet commerce.
Nov. 14 Security in Practice
Mark Bruhn, Chief IT Security and Policy Officer, IU.
Security in theory is different from in practice. What does it mean to secure a network? How do network managers view security, and what are the real-world threats likely to be faced by security managers.
Nov. 21 Happy Thanksgiving
Thanksgiving is a celebration of coming together in the third English settlement in the Americas. The first English colony was destroyed during warfare with the local people and the second defended itself fiercely ( Jamestown). Like the network today, both cooperation and the need for security played critical roles in early settlement of America.
Nov. 28 Malware on the Network
Raquel Hill, Assistant Professor, Informatics and Computer Science.
Connectivity is exposure. Network risks include denial of service, masquerade attacks, and directing hacking assaults. This session will focus on understanding the threats created on and in the network.