SENECA COLLEGE, TORONTO
INFORMATION SECURITY and PROTECTION of PRIVACY
This is Part B of a course that runs 4 months. It is 2 months and runs for 7 classes in March-April 2002
As Taught by Prof. Tim Richardson School of Marketing and e-Business, Faculty of Business
.
Section 1 Section 2 Section 3 Section 4 Section 5
Risks
of
Insecure
Systems

Internal 
Threats
 

Risks with
Business
Partners

Types of attacks
- Criminal Attacks
- Privacy Violations
- Publicity Attacks
- Legal Attacks

Data
Interception

Viruses

Denial of
Service Attacks
 

Internet
Security
Standards

RSA Security

SANS Institute
PATCHES

Threat
Modeling &
Risk
Assessment

Security Policies
and 
Countermeasures



Security
Processes
.compartmentalize
.secure weak link
.use choke points
.defense in depth
.enlist users
.detect attacks


Threats - "Who"
-Hackers
-Crackers
 
Cryptography
and Authentification


Cryptography Video


Identification
and Authentification


.Confidentiality
.Integrity
.Authentification
.Non-repudiation

Access Controls

Encryption
Techniques

Key Management
56 bit / 128 bit key

Public Key
Private Key
Encryption

Digital Signatures
Certificate Authorities



email security
. PGP . PEM


Wireless security
RSA & Wireless
Firewalls

Components of a
Firewall

Functionality

Securing the
Firewall
-policy
-administration

Firewall
Limitations

Penetration
Testing

Intrusion
Investigation

 

This section is additional supplementary
material


Government

Industry
Associations

Gov't response
to intrusion and threats

National Government Involvement in internet crime and e-business security

CSIS
RCMP
FBI
Carnivore
Echelon

The Nigerian Scam
scams

Professional
Security
Service
Companies

. . . . .
.
last updated 2002 Dec 04
 
http://www.witiger.com/senecacollege/FCA240/grading240.htm Grading Information (How the marks are calculated)

Tim.Richardson@senecac.on.ca