3 credits | Prepared by K. Gopalakrishnan, May 2018 |
P: CSCI 3000, CSCI 3010. Computing systems security principles and models. Vulnerability assessment and prevention measures. Authentication and access control in distributed systems. Operating system, network, and database security.
The advent of the global Internet has brought about a significant change in the way people communicate and do business. Yet as this global village expands, so does the number of less than honest citizens. Furthermore, much of the hardware and software that constitutes the computer systems and the Internet was designed with only the trustworthy user in mind. As a result, intruders can invade the privacy of network communications as well as read or alter stored information.
This course is meant to be a first course on cybersecurity for computer science students. Cybersecurity is a vast area. To have some focus, in this course we will concentrate on the following select topics: Cryptographic Tools, Authentication, Access Control, Denial of Service Attacks, Intrusion Detection and Prevention, Network Security Protocols such as SSL and Kerberos .
COMPUTER SECURITY: Principles and Practice by William Stallings and Lawrie Brown, Pearson Education Inc., Third Edition, 2019.
Your grade in this course will be based on your performance in assignments, quizzes and examinations. There will be a mid-term exam and a final exam. The weights assigned to different components are given below.
Quizzes | 30% |
Mid-Term Exam | 15% |
Final Exam | 25% |
Assignments | 30% |
Grade | Meaning |
---|---|
A | Achievement substantially exceeds basic course expectations |
A− | |
B+ | |
B | Achievement exceeds basic course expectations |
B− | |
B+ | |
C | Achievement adequately meets basic course expectations |
C− | |
D+ | |
D | Achievement falls below basic course expectations |
D− | |
F | Failure – achievement does not justify credit for course |