The Proceedings of the Information Systems Education Conference 2000: §581    Home    Papers/Indices    prev (§580)    Next (§582)
    Seminar/Workshop     Leading Edge and Emerging Technologies
Recommended Citation: Tis, B P.  Computer Security Fundamentals and Applications.  In The Proceedings of the Information Systems Education Conference 2000, v 17 (Philadelphia): §581.

Computer Security Fundamentals and Applications

Bruce P. Tis    [a1] [a2]
Simmons College    [u1] [u2]
Boston, Massachusetts, USA    [c1] [c2]

Computing security has long been of interest to the military, the federal government and the banking industry. During the past 5 years, with the proliferation of the Internet and WEB, even the casual user of today's technology is required to have an understanding of security fundamentals in order to protect themselves. The popular press continually reports the exploits of hackers, the destruction caused by viruses, and white-collar crime involving security breaches. As educators we have the responsibility to be knowledgeable ourselves, as well as to view security not as a specialized topic, but rather as a body of information that should be integrated into our curricula. Students need to develop a healthy respect of security issues and be prepared to use, design and implement secure systems, as well as develop new techniques to address security issues of the future. This workshop includes coverage of three major topics: (1) fundamentals of security, (2) applications, and (3) teaching computing security to our students. After attending this workshop the attendee should be familiar with basic security concepts and terminology and be able to integrate security education into information systems curricula.

Keywords: security, encryption, public key cryptography, authentication

Read this presentation handout (non-refereed) in Adobe Portable Document (PDF) format. (63 K bytes)
Preview this presentation handout (non-refereed) in Plain Text (TXT) format. (2 K bytes)

photo/graphicjpg16 K bytesBruce P. Tis

Comments and corrections to