bus 4720 supply and demand in small businesses. host and application security lesson 1:...

13
BUS 4720 Supply and Demand in Small Businesses

Upload: jeffry-allison

Post on 19-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

BUS 4720Supply and Demand in Small Businesses

Page 2: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Host and Application SecurityLesson 1: Introductions and Expectations

Page 3: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Welcome to my (our!) new class! Agenda

Who am I, what’s my background Who are you? What do you want to learn? Why are you taking this class?

Page 4: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Host-based Security is About… Microsoft Word viruses Why rootkits work… Is a Mac really “more secure” than a PC? Browser security

Page 5: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Me Harris Building, Rm 212 Dept. Head, Computer Sciences &

Cybersecurity Associate Director of the Harris Institute,

Harris Professor of Computer Science Non-traditional academic background Very interested in security

Page 6: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Books The Art of Computer Virus Research by Peter

Szor Security in Computing by Pfleeger & Pfleeger

(reference) We will also be looking at a lot of papers this

semester

Page 7: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Website http://www.malware.org/teaching NB: some version of IE want to unzip pptx

files… don’t let them Warning: Slides I haven’t given might get

changed before class, so while you are welcome to read ahead, assignments might change

Page 8: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Grading Programming is something you do…

Thus, there are many assignments You lose half a letter grade for every day you are

late Your peers will tell you this doesn’t happen… but it will

this year! Assignments are due before class on the day

assigned This year, all assignments will be submitted through

email

Page 9: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Grading (cntd) To make a passing grade in this class you

must pass the final Assignments + Class Participation + Spot

Quizzes are about 70% of your grade Midterm and Final are the other 30%

However, note the caveat above

Page 10: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Plagiarism I have a zero tolerance policy for plagiarism Any incidents will be referred to the College of

Engineering Try me on this, I have done it before!

However, why? I want you to learn, and cheating mainly cheats

yourself Learning and understanding host and application

security will change how you think about computing

Page 11: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Classes Please come on time

But if you’re running late, come anyway! I’m not going to always warn you about tests,

and they do count toward your final grade!

Page 12: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Office Hours Tue: 130-300, Thur: 930-1100 Other times, happily, by appointment – talk to

Karen Brown If you’re making a special trip to campus to

see me, it might make sense to email me first

Page 13: BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations

Questions & Comments rford@<you-know-where.edu>