1 / 7

Information and Security Analytics

Information and Security Analytics. Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course. Course Outline. May 28, 2010: Data Management Relational data management, distributed data management. Heterogeneous data integration, data warehousing

areese
Download Presentation

Information and Security Analytics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information and Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course

  2. Course Outline • May 28, 2010: Data Management • Relational data management, distributed data management. Heterogeneous data integration, data warehousing • June 4, 2010: Data Mining • June 11, 2010: Knowledge management, semantic web, social networking • June 18, 2010: Exam 1 • June 25: Introduction to Security, Security Governance and Risks • July 2: Architecture, Access Control • July 9: Cryptography, Physical security • July 16: Network security, Legal aspects • July 23: Data and Applications Security • July 30: Operations security, Disaster planning • August 6: TBD (Exam 2?)

  3. Course Rules • Unless special permission is obtained from the instructor, each student will work individually • Copying material from other sources will not be permitted unless the source is properly referenced • Any student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advices by the department • No copying of anything from a paper except for about 10 words in quotes. No copying of figure even if its attributed. You have to draw all figures.

  4. Course Plan • Exam #1: 16 points • Information management; June 18 • Exam #2: 24 points • Information security; August 6 • Two term papers 12 points each: Total 24 points • At least one paper related to security • First one due June 25; Second due July 16 • Programming project or Extensive term paper: 16 points • Either Information security or in Information management; Due July 30 • Two Assignments: 10 points each • Both in security; • Given July 2 – Due July 9; Given July 16 – Due July 23

  5. Contact • For more information please contact • Dr. Bhavani Thuraisingham • Professor of Computer Science and • Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 • Phone: 972-883-4738 • Fax: 972-883-2399 • Email: bhavani.thuraisingham@utdallas.edu • URL: • http://www.utdallas.edu/~bxt043000/

  6. Project • CD-ROM - your software • Hard copy – design document • Project description • Architecture (prefer with a picture) and description (software – e.g., Oracle, Jena etc.) • Results • Analysis • Potential improvements • References

  7. Paper: Original – you can use material from sources, reword (redraw) and give reference • Abstract • Introduction • Body of the paper • Comparing different approaches and analyzing • Discuss your approach, • Survey • Conclusions • References • ([1]. [2], - - -[THUR99]. • Embed the reference also within the text. • E.g., Tim Berners Lee has defined the semantic web to be -- -- [2].

More Related