CSS 438: Security Strategies for Web Applications and Social Networking

Course Description

This course will focus on how internet and web-based applications have transformed the way businesses, organizations, and people communicate. With this transformation comes new risks, threats, and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with Web applications and social networking. (3 credits)

Prerequisites

  • ENG 101: English Composition 1
  • ENG 102: English Composition 2
  • ITE 145: Fundamentals of Information Systems Security OR CSS 101 Cybersecurity Fundamentals
  • ITE 220: Networking & Data Communications (Recommended)

Student Learning Outcomes (SLOs)

Students who successfully complete this course will be able to:

  1. Analyze the impact of the Internet and Web applications on the business world.
  2. Analyze common personal online security threats and risks.
  3. Compare and contrast Web-based risks.
  4. Describe the attributes and qualities of the software development life cycle and secure coding practices.
  5. Analyze the role and importance of audit and compliance to Web application security.
  6. Analyze the role and importance of quality assurance testing for Web applications.
  7. Explain the value and importance of vulnerability and security assessments for Web applications.
  8. Describe popular mobile devices and communications technologies, and their security risks.
  9. Identify store-and-forward and real-time communications, and the threats against them.
  10. Describe common areas of the IT industry and the roles each plays in creating secure environments.

Course Activities and Grading

AssignmentsWeight

Discussions (Weeks 1-8)

6%

Cloud Labs (Weeks 1-8)

20%

Written Assignments (Weeks 2, 3 & 5)

8%

Project 

37%

Final Exam (Week 8)

25%

Total

100%

Required Textbooks

Available through Charter Oak State College's Book Bundle

  • Harwood, Mike. Internet Security: How to Defend Against Attackers on the Web - Print Bundle for LMS Integrations. 3rd ed. Sudbury, MA: Jones & Bartlett, 2016. ISBN-13: 9781284267990

Course Schedule

Week

SLOs

Readings and Exercises

Assignments

1

1,2

Topics: The Internet, the World Wide Web, and the Need for Security

  • Readings:
    • Chapters 1-3
  • Read assigned chapters
  • Review assigned link
  • Review Course Policies
  • Review Course Materials
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 1
  • Submit Project: Part 1

2

3

Topics: Website and Web Application Risks, Threats, Vulnerabilities, and Security

  • Readings:
    • Chapters 4 and 5
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 2
  • Submit Assignment: Common Security Vulnerabilities in E-commerce Applications

3

3

Topics: How Web Applications Work and Security Issues

  • Readings:
    • Chapters 6 and 7
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 3
  • Submit Assignment: DoS Attacks and Defense Measures
  • Submit Project: Part 2

4

4, 7

Topic: Securing Websites and Web Applications and Mitigating Vulnerabilities

  • Readings:
    • Chapters 8 and 9
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 4
  • Submit Project: Part 3

5

5, 7

Topic: Performing a Website Vulnerability and Security Assessment and Maintaining Compliance

  • Readings:
    • Chapters 10 and 11
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 5
  • Submit Lab 6
  • Submit Assignment - Best Practices for Software Configuration Management (SCM)

6

6

Topics: Testing and Quality Assurance for Websites

  • Readings:
    • Chapter 12
  • Read assigned chapter
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 7
  • Submit Project: Part 4

7

8, 9

Topics: Securing Mobile, Personal, and Business Communications

  • Readings:
    • Chapters 13 and 14
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 8
  • Submit Lab 9
  • Submit Project: Part 5

8

10

Topics: Security Training, Education, and Certification

  • Readings:
    • Chapter 15
  • Read assigned chapter
  • Review the Lecture material
  • Participate in the Discussion
  • Submit Lab 10
  • Submit Final Exam
  • Complete the Course Evaluation

COSC Accessibility Statement

Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.

COSC Policies, Course Policies, Academic Support Services and Resources

Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.