T. Andrew Yang
|
2/30/2011 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CSCI 4233 & CINF 4233
Computer Security Spring 2011 (1/18 – 5/2 + final week)
Time & Classroom Thur., 4-6:50pm (Delta 242) Course Description: Introduction to encryption and decryption; security mechanisms in
computer architectures, operating systems, database, networks, and
introduction to security. Prerequisite: CSCI3532 (Advanced Data
Structures and Algorithms) + MATH3331 (Discrete Math), or equivalents. Special Note: Students who have
completed CSCI5233 (Computer Security & Integrity) should not take this
course. Instead, please consider taking CSCI5235 Network Security, CSCI5234
Web Security, or other advanced courses. Course Objectives: Introduction to encryption
and decryption; security mechanisms in computer programs, operating systems,
databases, networks, administration of computer security, and legal/ethical
issues in computer security. This course provides foundation knowledge
for further advanced study of security issues in computer systems and
applications. Learning
Outcome:
Class Format: Lectures are combined with
discussions and, if applicable, student presentations and discussions of
advanced topics. Students are expected to be active participants, by studying
the relevant chapters and/or research papers, and participating at in-class
discussions. Instructor: Dr. T. A. Yang
Teaching assistant info
and office hours: TA - Neeraj
Jadhav (jadhav.neeraj87@gmail.com) Hours - Monday: 3.00 PM to 6.00 PM Tuesday:
9.00 AM to 1.00 PM Wednesday: 3.00 PM to 6.00 PM Thursday:
9.00 AM to 1.00 PM Required Text:
+ Instructor's handouts in
the class and/or on the Web Recommended (but not
required):
References and Resources: Ongoing research related
to computer security Topics and Notes
The computers in the PC Lab (Delta 119) are configured with JDK and JCE for running
the sample programs. You are encouraged to configure your own computer to do
the projects. ·
Windows account information at: http://sce.uhcl.edu/accountSearch.html ·
Click http://sce.uhcl.edu/NTLabIntroduction.asp
for the list of available software in the PC lab.
++ Attendance Policy: You are expected to attend all classes.
There will be no penalty for a person’s first two absences without documented
excuse. 1% will be taken for each of the absences after the first two
absences. Note: Being tardy is
no excuse when a person is found to be absent from the class. Note: If you ever miss a class, it is your responsibility to get hold of
whatever may have been discussed in the class. +++ Class Participation: Participating in the class is expected. You
should ask or answer questions during the in-class or online discussions. Up
to 3% may be granted to students who are active participants. Grading Scale: The accumulated points
from all the categories determine a person's final grade. There will be no
extra-credit projects.
Tests
& Exams: Both analytic and synthetic abilities are
emphasized. Being able to apply the learned knowledge toward problem solving
is also highly emphasized in the tests. Unless due to unexpected, documented emergency, no
make-up exams will be given. No make-up exams will be granted once the exams
have been corrected and returned to the class. Assignments and projects will be posted at the
class web site. Assignments & projects are due before the beginning of
the class on the due day. See Topics and Notes
for the due dates. a. Identification page:
All assignments must have your name, and course name/number/section
number (e.g., CSCI4233-01) at the top of the first page. b. Proper stapling: Staple
all the pages together at the top-left corner. NOTE: Do not use paper clips. c. Order ! Order! Arrange
the solutions following the sequence of the questions. Write the question
number at the top-right corner of each page. d. Word processing: It
is required that you type your reports (e.g., print them using a printer).
Use a word processor and appropriate typesetting and drawing tools to do the
assignments. Spell-check the whole document before printing it. You
may lose points due to spelling or grammatical errors. Projects: The projects will involve the design and
implementation of encryption/decryption algorithms and/or application of the
algorithms to real-world problems. Students are expected to employ the
theories and techniques learned in the class to design the system. Details of the projects will be later made
available at Assignments & Projects. NOTE: Unless otherwise
specified, all assignments and projects are individual work.
Students should take caution not to violate the academic
honesty policies. Check out the details at this
link. Instructor's
Notes:
Related Links:
Go to the Index |