CIS 3360 Security in Computing Cliff Zou Spring

  • Slides: 10
Download presentation
CIS 3360: Security in Computing Cliff Zou Spring 2012

CIS 3360: Security in Computing Cliff Zou Spring 2012

Course Information q Course lecture time q q q Teacher: Cliff Zou (Associate Professor)

Course Information q Course lecture time q q q Teacher: Cliff Zou (Associate Professor) q q Office: HEC 243 407 -823 -5015 Email: czou@eecs. ucf. edu Office hour: Mo. We 9 am – 11 am Course Webpage: q q q Video recorded at Mo. We 2 pm – 3: 15 pm Video released on UCF Tegrity server Mo. We 5 pm http: //www. cs. ucf. edu/~czou/CIS 3360/index. html Syllabus is on the course webpage and Web. Course UCF Tegrity for online lecture video streaming Web. Course has a Tegrity link q Or you can directly login to Tegrity at: https: //tegrity. ucf. edu/Tegrity. Utils/Login. aspx q 2

Course Information q Use Webcourse@UCF for homework assignment and grading Keep grade private q

Course Information q Use Webcourse@UCF for homework assignment and grading Keep grade private q Homework submission q Also have a simple BBS channel for Q&A and discussion among students q I will read the BBS twice a week to answer any course related questions q You can also directly email me for questions q q Homework solutions will be posted on Web. Course after their due date 3

Course in Degree Requirement q q q Required course for CS majors Required course

Course in Degree Requirement q q q Required course for CS majors Required course for IT majors Required core course for Multi. Disciplinary Minor in Secure Computing and Networks (SCAN) q q http: //www. cs. ucf. edu/it/SCANminor. html It has a face-to-face session as well (taught by another faculty) 4

Objectives q The student will be able to q q q Explain what security

Objectives q The student will be able to q q q Explain what security in networked computing systems means. Perform base conversions and arithmetic operations in computer number systems. Describe at a high level the vulnerabilities and threats in the Internet and networked computing systems. Encrypt, decrypt and transmit messages using cryptographic techniques. Apply methods to detect, prevent and repair attacks in networked computing systems. Determine when cyber activities are illegal and criminal. Also, identify the laws and codes of ethics governing the protection of information through copyrights, patents, trade secrets, and trademarks 5

Course Materials q Textbook: q Reference books: q q q Introduction to Computer Security.

Course Materials q Textbook: q Reference books: q q q Introduction to Computer Security. M. Goodrich and R. Tamassia, Addison Wesley, 2011. J. Kurose and K. Ross, Computer Networking – A Top-Down Approach, Fifth Edition, Addison-Wesley, 2010. C. Pfleeger and S. Pfleeger, Security in Computing, Fourth Edition, Prentice Hall, Inc. , 2007. Peter Szor, The Art of Computer Virus Research and Defense, Symantec Press, Addison-Wesley, 2005. M. Quinn, Ethics for the Information Age, Third Edition, Addison-Wesley, 2009. Other references that we can find online 6

Grading Policy q Coursework times approx % q q q Written homework 4 30%

Grading Policy q Coursework times approx % q q q Written homework 4 30% Programming projects 2 25% Midterm exam 25% Final exam 1 20% Grading will use +/-, i. e. , A, A-, B+, B, B, …. Will use relative ranking among the whole class for final GPA grade. 7

Exam Format q q Since it is a fully online course, we cannot do

Exam Format q q Since it is a fully online course, we cannot do written exam on campus Exams can be treated as special homework assignments Exam is released on Web. Course as an assignment q Exam is due 24 hours after its release q You cannot discuss with another student for solving exam q q You can do it for normal homework assignments 8

Academic Honesty q q Plagiarism and Cheating of any kind on an examination, quiz,

Academic Honesty q q Plagiarism and Cheating of any kind on an examination, quiz, or assignment will result at least in an "F" for that assignment (and may, depending on the severity of the case, lead to an "F" for the entire course) and may be subject to appropriate referral to the Office of Student Conduct for further action. See the UCF Golden Rule for further information. The Golden Rule http: //goldenrule. sdes. ucf. edu/ 9

q Questions? 10

q Questions? 10