Welcome to COMP 4290 - Special Topics: Computer Security! This website is designed to keep you informed about the schedule, policies, assignments, projects, and other elements of the course.

Meeting Time and Place

Time: MWF 12:40 - 1:35 p.m.
Location: Art & Communication C116
Prerequisites: COMP 2100

Instructor

Name: Dr. Barry Wittman
E-mail: wittman1@otterbein.edu
Office: Art & Communication C123
Phone: (614) 823-2944
Office Hours: MWF 9:00 - 10:15 a.m.
MF 1:45 - 4:00 p.m.
W 1:45 - 3:30 p.m.
R 10:00 - 11:30 a.m.
TR 2:00 - 4:00 p.m.
and by appointment

Text Book

Charles Pfleeger, Shari Pfleeger, and Lizzie Coles-Kemp
Security in Computing
Sixth Edition, 2023, Prentice Hall
ISBN-10: 0137891210
ISBN-13: 978-0137891214
Available through Amazon here


Course Catalog Description

This course introduces the student to the fundamentals of computer security. Foundational concepts such as confidentiality, integrity, and availability are discussed in the context of both designing systems and evaluating existing systems for vulnerabilities. Cryptography is explored as a tool that can be applied to many aspects of computer security. Theoretical discussions of security principles are enriched by examples from real world systems and protocols. Special emphasis is laid on web, OS, database, and network security. Legal, ethical, privacy, and economic considerations are discussed.

Student Learning Outcomes

By the end of the course, students will be able to:

  1. Apply knowledge of computing and mathematics appropriate to the discipline, including common data structures, basic algorithms, and modular arithmetic
  2. Design, implement, and evaluate security policies and mechanisms to enforce those policies
  3. Communicate effectively with a broad range of audiences
  4. Explain the local and global impact of computing and the associated professional, ethical, legal, security and social responsibilities
  5. Function effectively on teams and use software engineering principles to accomplish a common goal
  6. Discuss the central issues of computer security
    1. Confidentiality
    2. Integrity
    3. Availability
  7. Evaluate the strengths and weaknesses of various public and private key encryption techniques
  8. Explain the usefulness of cryptographic hash functions
  9. Design protocols and systems to minimize security vulnerabilities
  10. Analyze current threats and how to minimize the associated risks in the areas of:
    1. Web security
    2. OS security
    3. Database security
    4. Network security

Program Learning Outcomes

The Computer Science major has a set of 10 Student Learning Outcomes (SLOs). Work in this course contributes to the following SLOs:

  1. Students are proficient in logic and discrete mathematics.
  2. Students can apply development practices and processes to a variety of problems.
  3. Students can effectively present a technical topic to an audience.
  4. Students can effectively collaborate in team projects.
  5. Students recognize the unique ethical responsibilities of computer scientists and are familiar with the ACM Code of Ethics and Professional Conduct.