Computer and Network Security

CS475

Winter 2014

TR 12:30pm - 1:50pm


Instructor

Dr. Rachel Greenstadt
Department of Computer Science
Drexel University
Office: University Crossings 140
Tel: 1 215 895 2920
Email: greenie AT cs drexel edu
Office Hours: Wed 2:00-3:00 or by appt

Teaching Assistant

TBD

Course Overview

This course provides a broad introduction to a variety of topics in applied computer and network security. These include software vulnerabilities, applied cryptography, network security, privacy, anonymity, usability, and security economics.

Prerequisites

  • CS 472
  • A serious interest in computer and network security.
  • Basic competency in computer science including computer architecture and socket programming, and basic competency in mathematics.

Textbook

The textbook for the course is Security Engineering by Ross Anderson.

Coursework and Grading

Grading will consist of three exams, three projects, online and in-class participation (including online discussion), and some written homework assignments. Projects may be done in groups of two or three people. The exams will be written, in class, and cover topics from the textbook, lectures, and supplemental readings. This class will follow the departmental academic integrity policy.

Below is the grading breakdown:

  • Exams: (3x15) 45%
  • Projects: (2x10) 20%
  • Final Project/Security Reviw: 20%
  • Other homeworks, Class participation: 15%

The class participation grade will be determined by active participation in class discussions and exercises.

Assignments

Schedule

Note: This schedule is tentative and can change. In particular, look for readings to be added.

January 7 : Intro and Security Reviews

January 9: No-Tech Hacking, Usability, and Psychology

January 14: Ctrl-Alt-Hack

January 16 : Security Reviews

January 21 : Software Security: Attacks

January 23 : Software Security: Attack Exercises

January 28: Software Security: Defenses I

January 30: Software Security: Defenses II

February 4 : Symmetric Cryptography

February 6: Exam I

February 11: Asymmetric Cryptography

February 18: Authentication

February 20 : Hashing/Cryptography Exercises

February 24: Network Security I

February 26 : Network Security II / More Security Reviews

  • Readings
    • Anderson, Chapter 24

March 4 : Privacy

March 6 : Guest Lecture Aylin Caliskan-Islam

March 11 : Privacy, Part 2 and Review

March 13: Exam 3

March 21: Project 3 Due

2013 Slides