Welcome to COMP 4290 - Special Topics: Computer Security! This website is designed to keep you informed about the schedule, policies, assignments, projects, and other elements of the course.
Meeting Time and Place
Time: | MWF 12:40 - 1:35 p.m. |
Location: | Art & Communication C116 |
Prerequisites: | COMP 2100 |
Instructor
Name: | Dr. Barry Wittman |
E-mail: | wittman1@otterbein.edu |
Office: | Art & Communication C123 |
Phone: | (614) 823-2944 |
Office Hours: |
MWF 9:00 - 10:15 a.m. MF 1:45 - 4:00 p.m. W 1:45 - 3:30 p.m. R 10:00 - 11:30 a.m. TR 2:00 - 4:00 p.m. and by appointment |
Text Book
Charles Pfleeger, Shari Pfleeger, and Lizzie Coles-Kemp |
![]() |
Course Catalog Description
This course introduces the student to the fundamentals of computer security. Foundational concepts such as confidentiality, integrity, and availability are discussed in the context of both designing systems and evaluating existing systems for vulnerabilities. Cryptography is explored as a tool that can be applied to many aspects of computer security. Theoretical discussions of security principles are enriched by examples from real world systems and protocols. Special emphasis is laid on web, OS, database, and network security. Legal, ethical, privacy, and economic considerations are discussed.
Student Learning Outcomes
By the end of the course, students will be able to:
- Apply knowledge of computing and mathematics appropriate to the discipline, including common data structures, basic algorithms, and modular arithmetic
- Design, implement, and evaluate security policies and mechanisms to enforce those policies
- Communicate effectively with a broad range of audiences
- Explain the local and global impact of computing and the associated professional, ethical, legal, security and social responsibilities
- Function effectively on teams and use software engineering principles to accomplish a common goal
- Discuss the central issues of computer security
- Confidentiality
- Integrity
- Availability
- Evaluate the strengths and weaknesses of various public and private key encryption techniques
- Explain the usefulness of cryptographic hash functions
- Design protocols and systems to minimize security vulnerabilities
- Analyze current threats and how to minimize the associated risks in the areas of:
- Web security
- OS security
- Database security
- Network security
Program Learning Outcomes
The Computer Science major has a set of 10 Student Learning Outcomes (SLOs). Work in this course contributes to the following SLOs:
- Students are proficient in logic and discrete mathematics.
- Students can apply development practices and processes to a variety of problems.
- Students can effectively present a technical topic to an audience.
- Students can effectively collaborate in team projects.
- Students recognize the unique ethical responsibilities of computer scientists and are familiar with the ACM Code of Ethics and Professional Conduct.