CPSC 1000 Introduction to Computing
(Non-IA course)
Course Description:
Overview of the development of the electronic computer, its technology, capabilities, and limitations. Ethical and social issues are considered, as well as the role of computers in society. Introduction to the use of a range of useful microcomputer hardware and software. Extensive laboratory experience. Supplementary course fee assessed.
Texts
This course is intended for non-CS majors. and does not use a written text; rather all material is present within a learning system called SAM (Skills Assessment Management). However, the material within SAM is linked to the textbook: New Perspectives Computer Concepts; Edition:2012; Authors: June Jamrich Parsons and Dan Oja;Publisher: Thomson, Course Technology; ISBN: 9781111529086 (non e-book form for reference). The material is delivered through a concept called training in which students view video on topics from the text. Additional help is available if the student misses a questions including links to the text.
Delivery: This course is delivered as an online course and all material is handled through the Learning Management System (LMS) of the University. There are two aspects to this course, an Office skills portion and a concepts portion. The portion directly related to security deals with the concepts. There are no lecture slides rather interactivity. This course is an University wide course taken by a variety of majors. The following chapters are covered with each having a security component.
Orientation.
1. Computers and Digital Basics.
2. Computer Hardware.
3. Computer Software.
4. Operating Systems and File Management.
5. LANs and WLANs.
6. The Internet.
7. The Web and Email.
8. Digital Media.
Syllabus
References
Journal
- 2012. Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. ACM, New York, NY, USA.
- 2006. Proceedings of the 2006 ACM/IEEE International Symposium on Empirical Software Engineering. ACM, New York, NY, USA.
- ACM Communications in Computer Algebra. ACM, New York, NY, USA.
- IEEE Journal of Solid-State Circuits
- IEEE Custom Integrated Circuits Conference, CICC
- "The Second IEEE Workshop on Wireless LANS: Summary". Worcester Polytechnic Institute. Retrieved 2008-03-16.
- "The First IEEE Workshop on Wireless LANS: Preface". Worcester Polytechnic Institute. Retrieved 2008-03-16
Book
- Silberschatz, A., Galvin, P. B., & Gagne, G. (2013). Operating system concepts (Vol. 8). Wiley.
- Murphy, J. S. (1970). Basics of digital computers.
- Alt, F. L. (1960). Advances in computers. Amsterdam: Elsevier.
- Geier, J. T., & Geier, J. (2002). Wireless LANs (pp. 101-102). Sams.
- Young, G. (1998). The Internet. New York: H.W. Wilson.
- Lamb, L., & Peek, J. D. (1995). Using email effectively. Sebastopol, Calif: O'Reilly & Assoc.
- Meikle, G., & Young, S. (2012). Media convergence: Networked digital media in everyday life. Basingstoke, Hampshire [England: Palgrave Macmillan
Article
- CentrePath Manages LANs And WANs; The Magellan DataPath Manager adds support for Linux, provides root-cause analysis, and lets customers manage LANs and WANs.(Brief Article). (January 01, 2005). Informationweek.
- Frank, A. (January 01, 1996). Multimedia LANs and WANs. Lan : the Network Solutions Magazine, 11, 7, 81.
Resources
Secure Use |
|
General Security Policy: Cyber Ethics |
Cyber Ethics |
General Security Policy: Information Technology Security Evaluation Criteria (ITSEC) |
ITSEC Definition |
General Procedures: Inference |
Inference Definition |
General Procedures: Rainbow Series |
Rainbow Series |
General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems |
NSTISS Glossary
|
General Countermeasures and Safeguards: Computer Law |
Computer Law |
General Countermeasures and Safeguards: Computer Media |
Computer Media
|
General Countermeasures and Safeguards: Evaluate Security Testing Tools |
Security Testing Tools |
Administrative Countermeasures/Safeguards: Control Management |
Change Control
|
Administrative Countermeasures/Safeguards: Privacy Act |
Privacy Act of 1974 |
Operations Policies/Procedures: Keystroke Monitoring |
Keystroke Monitoring |
Operations Policies/Procedures: Disaster Recovery Planning |
Disaster Recovery |
Incidents |
|
Policy and Procedures: Incident Response |
Incident Response |
Policy and Procedures: Witness Interrogation |
Witness Interrogation |
Operations Countermeasures/Safeguard: Computer Attacks |
Computer Attacks
|
Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams |
CERT |
Configuration |
|
Administrative Policies/Procedures: Approval to Operate |
Approval to Operate |
Administrative Policies/Procedures: Configuration/Change Control |
Change Control |
Administrative Policies/Procedures: Copyright Protection |
Copyright Protection |
Administrative Policies/Procedures: Patch Management |
Patch Management |
Administrative Policies/Procedures: Records Management |
Records Management |
Administrative Policies/Procedures: Wireless Use Policies |
Wireless Use Policy |
Anomalies and Integrity |
|
General Risk Management: Computer System Risk Management |
Risk Management |
Access Control Safeguards: Computer System Access Control |
Access Control |
Access Control Safeguards: Protected Distribution Systems |
Protected DistributionSystem |
Access Control Safeguards: Information Systems Access Restrictions |
Access Restrictions |
Administration |
|
Access Control Mechanisms: KMI Applications |
Key Management |
Access Control Mechanisms: Single Sign-on |
Single Sign On |
IA Sites
- National Security Agency, Central Security Service—Information Assurance
- Information Assurance Support Environment
- Information Design Assurance Red Team (IDART)
- National Institute of Standards and Technology (NIST) Computer Security Division
- NIST Computer Security Resource Clearinghouse
- National Telecommunications and Information Administration (NTIA)
- ICAT Metabase
- ICAT is a searchable index of information on computer vulnerabilities. It provides search capability at a fine granularity and links users to vulnerability and patch information.
- National Vulnerability Database (NVD)
- STRATCOM
- ASD NII
- Defense Advanced Research Projects Agency (DARPA)
- Defense Information Systems Agency (DISA)
- Internet Traffic Report
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100 and is updated ever 15 minutes. Higher values indicate faster and more reliable connections. - Electronic Privacy Information Center Home Page
Public interest research center in Washington, D.C. - Internet Privacy Coalition
- International Computer Security Association (ICSA)
ICSA is known worldwide as an objective source for security assurance services. - Glossary of Information Warfare Terms
- Cyberwar - Information warfare and psychological operations
Provides information on the topics of propaganda analysis, online journals, index and metapages, general resources, intelligence agencies, and articles and documents. - Reliable Software Technologies (RST): Information Warfare
- Forum of Incident Response and Security Teams (FIRST)
- FIRST brings together a variety of computer security incident response teams from government, commercial, and academic organizations. FIRST aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large.
- International Association for Cryptologic Research (IACR)
The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose primary purpose is to further research in cryptology and related fields. - International Biometrics Industry Association (IBIA)
- Common Vulnerabilities and Exposures
- A list of standardized names for vulnerabilities and other information security exposures - CVE aims to standardize the names for all publicly known vulnerabilities and security exposures.
- Institute for Applied Network Security (IANETSEC)
The Institute for Applied Network Security is the premier membership organization for practicing information security professionals. The Institute's mission is to provide key technical and business insights to help members solve their most pressing professional challenges. - Reliability Information Analysis Center (RIAC)
Reliability Information Analysis Center (RIAC) : A Government and Industry focal point for Reliability, Maintainability, Quality, Supportability, and Interoperability related Engineering, Data, Software, Information, Training and Technical Assistance.