cs458 - Spring 2007


Goal

This class is an introduction to the fundamentals of computer and information security. The course focuses on algorithms and techniques used to defend against malicious software.

Topics include an introduction to encryption systems, operating system security, database security, network security, system threats, and risk avoidance procedures.

Prerequisites: CS-425 and CS-450.


Hours

Section 51 Section 92 Section 251
Instructor Virgil Bistriceanu
Office hours Wed, Thu 5:30 pm - 6:15 pm
Office SB-214
Phone (312) 567-5146
Fax (312) 567-5067
e-mail bistriceanu@iit.edu
Lecture Wed 6:25 pm - 9:05 pm, SB-239
Teaching Assistant
  • Name: Xufei Mao
  • Office: SB-019B
  • Office Hours: Tue, Wed, 2:00pm - 3:00pm
  • Phone: 312-567-5869
  • email: xmao3@iit.edu

Books

Textbook

  • Introduction to Computer Security, Matt Bishop, Addison Wesley, ISBN: 0-321-24744-2

Other books

  • Security in Computing, Charles P. Pfleeger and Shari L. Pfleeger, Prentice Hall, ISBN: 0-13-035548-8
  • Exploiting Software - How to Break Code, Greg Hoglund and Gary McGraw, Addison Wesley, ISBN: 0-201-78695-8
  • Computer Security Fundamentals, Chuck Easttom, Prentice Hall, ISBN: 0-13-171129-6

Grading

  • Homeworks: 10%
  • Midterm: 20%
  • Final: 25%
  • Programming Assignments: 35%
  • Presentation: 10%

Everything you have to turn in is due before midnight the day the work is due.

For late submittal there is a 10% per calendar day penalty.

CNS printers tend to be busy the day the assignments are due, don't let them ruin your grade!

All the work you submit must be individual.

Academic dishonesty will not be tolerated. Please read IIT's rules and regulations.

Exams are open-book(s) open-notes.

The following grading scale will be used to determine your grade in this class:

  • A: 90 - 100
  • B: 80 - 89
  • C: 70 - 79
  • D: 60 - 69
  • E: 0 - 59 This is a failing grade!

To pass this class you will need to have a passing mark (60+) in each of the following:
  • Programming Assignments average
  • Presentation
  • Final
Of course, the overall average must be 60+ as well.

Class attendance and participation will help settle the borderline grades. Regular class attendance is important and students are expected to actively participate in class: questions and comments are always welcome.


Programming Assignments

Programming assignments are designed to improve your understanding of core concepts by implementing them. Feel free to use your favorite programming language or use this as an opportunity to learn new ones.

This semester assignments will flow along two themes:

  • Theme 1: Building a Secure Shell
    • Preparation for cryptography: use of a large integer library
    • 200-bit prime number generation and RSA
    • Encrypting network traffic
    • SSH server
  • Theme 2 : Building an Intrusion Detection System
    • Rule-based firewall implementation
    • Packet sniffing UDP/TCP, with message handling
    • Intrusion Detection System

Class Presentations

The purpose of this section is for students to do some independent research work and present their findings to the class.

No later than 2/8/07, each student must choose a topic for the class presentation. Your topic must be approved by your instructor.

Topics must be chosen from current issues in Information Security.

Submit your request via email to your class instructor. Topic requests will be honored on a FIFO basis. Your presentation will be scheduled based on the timing of your request, with requests coming in early being scheduled for class presentation later in the semester and later requests scheduled earlier.

A draft of the presentation is due two weeks prior to the scheduled date for the presentation. The purpose of this is to make sure you're on track with your work.

Allocate significant time to survey the IS topic you have selected. Do not wait until a few days before the presentation is due, chances are that if you do so, then you'll run out of time and will end up with a very poor mark in this section.

Presentations will be limited to 20' and will be followed by Q&A up to a total of 30'. Grading will consider both the content and the way the presentation is made to the class. Your peers will participate in the grading process and their opinion accounts for 40% of your mark.

From time to time there will be more students enrolled than the maximum number of time slots we can dedicate to presentations. In those cases the last students to submit a topic request will be graded solely based on the quality of written work they submit, with no class participation in the grading process. If you think that makes it easier for you, then think twice. Your presentation is due on the first day of student presentations as outlined in the Class Schedule; a draft of the presentation is due two weeks prior.

The presentation must be very well rehearsed; failure to properly prepare for the presentation will result in an extremely poor mark on the presentation.

The following grading sheet will be used for your class presentation.


Class Schedule

Date Lecture Programming Assignment Due
1/17/07 Introduction  
1/24/07 Elementary Cryptography  
1/31/07 Program Security  
2/7/07 Program Security (continued) #1
2/14/07 OS Security  
2/21/07 Trusted OS #2
2/28/07 Network Security #3
3/7/07 Midterm  
3/21/07 Network Security (guest speaker) #4
3/28/07 Database Security  
4/4/07 Administering Security (guest speaker) #5
4/11/07 Legal, Ethical and Privacy Issues  
4/18/07 Class Presentations, Day #1 #6
4/25/07 Class Presentations, Day #2  
5/2/07 Class Presentations, Day #3 #7
5/9/07 Final, 7:30pm to 9:30pm, SB-239  

Your instructor reserves the right to change this schedule.


Important Events

Event Sections 51, 92, 251
Classes begin 1/16/2007
Last day to drop a class and receive full tuition refund 1/30/2007
Deadline for topic selection for class presentation 2/7/2007
Last day to remove incomplete grades 2/23/2007
Midterm 3/7/2007
Spring vacation (no classes) 3/12 through 3/17/2007
Last day for official withdrawal 3/30/2007
Last day of classes 5/5/2007
Final 5/9/07, 7:30pm to 9:30pm, SB-239

For more important dates and detail go to the IIT site.


Varia

Unless otherwise stated all papers you turn in will be TYPED. No handwritten work is accepted. Each page will have a header as follows:

  • the left side: your name
  • middle: page number and the total number of pages (ex. 2/5 indicates this is page 2 out of a total of 5)
  • right hand side: name of the assignment (ex. Homework #2)

Each page will also have a footer:

  • the left hand side will contain the following text: cs458-section: Spring 2007 where section stands for the section you are in
  • the right hand side will contain the following text: Illinois Institute of Technology - Computer Science

The header and the footer will be Arial, 10 points, regular. The text for the paper itself will be typed using Times Roman (12 points regular, except for titles which may be larger and bold).


Last update: Feb 15, 2007 Virgil Bistriceanu cs458 Computer Science

$Id: syllabus.html,v 1.13 2007/05/06 00:06:56 Virgil Exp $