Office Hours and Locations. Vyas: Th 15:30--17:00 or by appointment, CIC 2122 Zach: Mon 17:00--18:00, CIC 2214 Tiffany: Tu 16:00--17:00, CIC 2214
|
|
- Jessie Palmer
- 5 years ago
- Views:
Transcription
1 Introduction to Computer Security This course will introduce students to the fundamentals of computer security. We will focus on software security, applied cryptography, network security, OS security, and privacy. A recurring theme will be security definitions, what kinds of security vulnerabilities may arise, and how to spot and fix vulnerabilities. Office Hours and Locations Vyas: Th 15:30--17:00 or by appointment, CIC 2122 Zach: Mon 17:00--18:00, CIC 2214 Tiffany: Tu 16:00--17:00, CIC 2214 Cortney: Wed 13:00--14:00, CIC 2214 Grading and Policies We shift total points with respect to the highest cumulative score achieved by a single student (not considering extra credit). In more detail, let the highest cumulative score by a student be highest, and the total possible points be max. Define delta = max - highest. If you have cumulative points z, then your score is calculated as z + delta, and your percentage as (z + delta)/max. We then translate a percentage into a letter grade as follows: : A : B : C : D < 59.5: F The total points possible are allocated as follows: 35% Homework 30% Exam 1 30% Exam 2 5% Class Participation Note that there are three exams: we will drop your lowest exam score. Late Days Late days interfere with the ability of course staff to quickly turn around assignment grades and solutions. The problem is we cannot give out solutions or graded assignments until everyone has turned in their work. Therefore, we only offer late days in emergency or exceptional circumstances, such as hospitalization. We do not offer late days for personal scheduling issues such as interviews, class load, etc. Policies, Ethics, and Cheating The course staff will treat all students ethically and fairly. We, in turn, expect the same from all students.
2 Any lapse in ethical behavior will immediately result in 1,000,000 points, as well as be immediately reported to the appropriate university disciplinary unit. Really. No matter what. The course staff looks at students who cheat or plagiarize as far beneath someone who fails the course. This course will follow CMU s policy on cheating and plagiarism. Note that the policy gives several examples of what constitutes cheating and plagiarism. If you have any questions, you should contact the instructors. Students should behave ethically. This means obeying the law, but that is not enough. Behaving ethically means you avoid activities that do harm or may do harm to people, the environment, or other computers. In short, don't be a nuisance. Note just because you can do something (or you read about others doing it) does not make it ok. For example, scanning a network may not be illegal (I am not a lawyer, so I shy away from definitive statements). However, scanning can crash computers. For example, we know of several very popular commodity-grade IP cameras that crash when you scan them. Sure, the camera software is buggy. But is there any reason for you, not being a professional, to crash a camera monitoring a baby? Launching exploits, testing the security of a system without explicit permission from all necessary parties, and so on are all unethical for the purpose of this course. Collaboration. Students are encouraged to talk to each other, to the course staff, or to anyone else about any of the assignments. Assistance should be limited to discussion of the problem and sketching general approaches to a solution. Each student must turn in his or her own solution, derived from his or her own thoughts. Course staff may verify a student did the prescribed work by asking for a verbal explanation, and failure to correctly re-explain a submitted solution is considered a strong indication of cheating. LECTURES No class. First day of class will be Wed, Aug Aug 2016 Course Overview 31 Aug introduction.pptx This lecture will give a high-level overview of the course, including topics covered, learning goals, and course mechanics. On Trusting Trust No Class 05 Sep 2016 University holiday: Labor day. Enjoy the day off! Compilation and Execution Semantics 07 Sep compilation.pptx This lecture will review the material up through Chapter 3 of CS:APP from We will cover the parts of the compilation tool chain and operations at the assembly level, including control flow, the memory model, and stack frames. Chapter 3 of Computer Systems: A Programmers Perspective Volume 2. Control Flow Attacks 12 Sep controlflow-attacks.pptx
3 In this lecture we will present control flow hijack attacks that gain control of the instruction pointer. We focus on buffer overflows and format string exploits. Smashing the Stack for Fun and Profit Exploiting Format String Vulnerabilities Smashing the Stack in 2011 Thinking Up Exploits 14 Sep 2016 We will do an in-class activity where the goal is to think through vulnerable code and develop an exploit. To make it even more fun, we will be doing it all without the help of a computer! Control Flow Hijack Defenses 19 Sep controlflow-defense.pptx This lecture will focus on control flow hijack defenses found in practice today, including canaries, DEP, and randomization (ASLR). We will also discuss methods for bypassing these defenses. ASLR Smack and Laugh Reference Design of ASLR in PAX (optional) Effectiveness of ASLR No Class 21 Sep 2016 No class (Vyas travel). Use this time to work on Assignment 1 :) The TAs will be available in class to answer any questions you may have about Assignment 1 Return Oriented Programming 26 Sep ROP.pptx This lecture will cover Return Oriented Programming. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Calls (on the x86) To learn more: Return-Oriented Programming: Systems, Languages, and Applications Q: Exploit Hardening Made Easy ropasaurusrex: a primer on return-oriented programming Control Flow Integrity 28 Sep CFI.pptx Control Flow Integrity (CFI) is a security property that specifies real executions should follow the static CFG. We will explore CFI, focusing on what the CFG is. Control Flow Integrity: Principles, Implementations, and Applications
4 Optional Software Fault Isolation, Native Client To learn more: Control-flow integrity (Full journal version.) Enforcing Forward-Edge CFI in LLVM and GCC Software Security Review 03 Oct Software-Security-Review.pptx This class will be a review period. We will provide approximately a 30 minute review, and then will open up the class for questions. Please think ahead of class what would be good questions; we are happy to answer anything. If there are no questions, it will be a short class. Software Security Exam 05 Oct 2016 We will have the first exam of the course. It will cover all information covered to date. This will be a closed book, closed note, closed neighbor exam. Introduction to Cryptography 10 Oct crypto-intro.pptx In this lecture we will provide a high-level introduction to cryptography, including an overview of primitives and security models. Handbook of Applied Cryptography Chapter 1 To learn more: Watch the Coursera Course on Cryptography Pseudorandom functions 12 Oct 2016 vyas 10-prf-prp-hash-prng.pptx We will cover the principles of pseudorandom functions, permutations, and introduce the notion of adversarial games to prove security properties of cryptographic constructions. Secrecy and Symmetric Key Ciphers 17 Oct crypto-block-ciphers.pptx We will cover the principle of secrecy (sometimes called privacy), stream ciphers, block ciphers, and block cipher modes. Integrity, Hashes, and MACS 19 Oct 2016 vyas 12-crypto-mac-authenc.pptx This lecture will look at the property of integrity, and the crypto primitives hashes and macs. We will also cover basics of authenticated encryption, which is a commonly used operation. Public Key Cryptography and TLS 24 Oct crypto-public-key.pptx In this lecture we will cover the fundamentals of public key cryptography, focusing on RSA and Diffie-Hellman as examples. We will also provide an overview of all the primitives in action, using TLS as an example.
5 Remote Timing Attacks are Practical Overview of SSL/TLS Encryption Introduction to Network Security 26 Oct netsec-intro.pptx This lecture will give a broad overview of network security. Optional Security Problems in the TCP/IP Suite A Look Back Security Problems in the TCP/IP Suite Crypto Review 31 Oct 2016 vyas 15-crypto-review.pptx This will be a review session for all lectures on cryptography. Please think ahead of time what questions you may have. Crypto Exam 02 Nov 2016 We will have the second exam of the course. It will cover all information covered to date. This will be a closed book, closed note, closed neighbor exam. IDS and Detection Theory 07 Nov netsec-firewalls-ids.pptx This lecture will discuss intrusion detection (and prevention) systems. We will cover design considerations in stateful vs stateless detection systems. Finally, we will cover some basic detection theory, focusing on the base rate fallacy. The Base Rate Fallacy and its implications for the difficulty of intrusion detection Web Security Part 1 09 Nov 2016 vyas 17-web-security.pptx This lecture will cover web security, including vulnerabilities such as injection attacks, XSS, and CSRF. Web Security Part 2 14 Nov 2016 vyas 17-web-security.pptx This lecture will cover web security, including vulnerabilities such as injection attacks, XSS, and CSRF. BGP and DDoS 16 Nov routing-ddos.pptx This lecture will cover BGP and DDoS. Optional Readings: Beware of BGP Attacks
6 A Taxonomy of DDoS Attacks and Defenses OS Security and The Gold Standard 21 Nov 2016 vyas 21-system-security.pptx This lecture will focus on OS security and the three AU s: authentication, authorization, and audit. Optional Readings: Computer Security in the Real World Protection of Information Thanksgiving 23 Nov 2016 Today is a University holiday. Enjoy the day off! Introduction to Mobile Security 28 Nov 2016 ddchen 19-f15-mobile-security.pptx This lecture will discuss issues on mobile security. Network and OS Review Day 30 Nov 2016 vyas 22-course-review.pptx We will have about a 30 minute review of all material in the third part of this class. The rest of the time will be devoted to questions and answers, so make sure you bring good questions. Exam 3 05 Dec 2016 This will be our third and final exam. Like previous exams it will be closed book, closed note, closed neighbor. The exam will focus on the last third of the course, but any material over the entire semester is game. Course Special Topics 07 Dec 2016 dbrumley We will have an end-of-course special topics session. ASSIGNMENTS Assignment 1 Assignment 2 Assignment 3 Released: September 16, 2016; Due: September 23, 2016 Released: October 22, 2016; Due: October 29, 2016 Released: November 14, 2016; Due: November 23, No Piazza support after November 21st.
Instructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationDepartment of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus
Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative
More informationInline Reference Monitoring Techniques
Inline Reference Monitoring Techniques In the last lecture, we started talking about Inline Reference Monitors. The idea is that the policy enforcement code runs with the same address space as the code
More informationIntroduction to Computer Networking
Introduction to Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 17, 2014 Outline General course information Program Preliminary schedule Intro to computer networking:
More informationComputer Security Course. Midterm Review
Computer Security Course. Dawn Song Midterm Review In class: Logistics On time: 4:10-5:30pm Wed 1 8x11 page cheat sheet allowed Special requirements: see TA Part I, II, III Scope Software Security Secure
More informationCS 241 Data Organization using C
CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am
More informationCSE 544 Advanced Systems Security
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA CSE 544 Advanced Systems
More informationTest Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,
Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code
More informationCPSC 4600 Biometrics and Cryptography Fall 2013, Section 0
CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li
More informationCOSC 115A: Introduction to Web Authoring Fall 2014
COSC 115A: Introduction to Web Authoring Fall 2014 Instructor: David. A. Sykes Class meetings: TR 1:00-2:20PM in Daniel Building, Room 102 Office / Hours: Olin 204E / TR 8:00-10:45AM, MWF 9:00 10:20AM,
More informationAdvisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431
Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:
More informationINFS 2150 (Section A) Fall 2018
INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;
More informationSyllabus CS 430 Introduction to Computer Security Winter 2016
Syllabus CS 430 Introduction to Computer Security Winter 2016 Meeting Times Instructor TA Textbooks Lect: 3:00-3:50 M, Tu, Wed, Th, HB 106 Lab: 3:00-3:50 M, HB 203 Dr. Razvan Andonie, HB 214-E, Office
More informationCOSC 115: Introduction to Web Authoring Fall 2013
COSC 115: Introduction to Web Authoring Fall 2013 Instructor: David. A. Sykes Class meetings: TR 1:00 2:20PM, Olin 212 Office / Hours: Olin 204E / TR 8:00-10:20AM, MWF 1:00 3:00PM, or by appointment/happenstance
More informationCSE 504: Compiler Design
http://xkcd.com/303/ Compiler Design Course Organization CSE 504 1 / 20 CSE 504: Compiler Design http://www.cs.stonybrook.edu/~cse504/ Mon., Wed. 2:30pm 3:50pm Harriman Hall 116 C. R. Ramakrishnan e-mail:
More informationcs642 /introduction computer security adam everspaugh
cs642 computer security /introduction adam everspaugh ace@cs.wisc.edu definition Computer Security := understanding and improving the behavior of computing systems in the presence of adversaries adversaries
More informationCS 3030 Scripting Languages Syllabus
General Information CS 3030 Scripting Languages Semester: Fall 2017 Textbook: Location: Instructor Info: None. We will use freely available resources from the Internet. Online Ted Cowan tedcowan@weber.edu
More informationINF 315E Introduction to Databases School of Information Fall 2015
INF 315E Introduction to Databases School of Information Fall 2015 Class Hours: Tuesday & Thursday10:30 am-12:00 pm Instructor: Eunyoung Moon Email: eymoon@utexas.edu Course Description Almost every website
More informationHomework 5: Exam Review
CIS 331 April 18, 2017 Introduction to Networks & Security Homework 5: Exam Review Homework 5: Exam Review This homework is due Wednesday, April 26 at 10 p.m.. You will have a budget of five late days
More informationComputer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect
More informationSyllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015
Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 I. COURSE DESCRIPTION An overview of information system security to include managing security, protecting information technology
More informationDatabase Security MET CS 674 On-Campus/Blended
Database Security MET CS 674 On-Campus/Blended George Ultrino gultrino@bu.edu Office hours: by appointment Course Description The course provides a strong foundation in database security and auditing.
More informationTCOM 663/CFRS Intrusion Detection and Forensics Department of Electrical and Computer Engineering George Mason University Fall, 2010
TCOM 663/CFRS 663 - Intrusion Detection and Forensics Department of Electrical and Computer Engineering George Mason University Fall, 2010 Course Syllabus Revised: June. 16, 2010. Instructor Dr. Kafi Hassan
More informationFIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010
FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the
More informationComputer Systems Organization
Carnegie Mellon Computer Systems Organization Shuai Mu Slides are based on Tiger Wang s and Jinyang Li s class Why study CSO? The path of your next few years graduation interview programmer The path of
More information(the bubble footer is automatically inserted into this space)
CS 3501: ICS Exam 2, fall 2018 Page 1 of 6 UVa userid: CS 3501: ICS Exam 2, fall 2018 Name You MUST write your e-mail ID on EACH page and bubble in your userid at the bottom of this first page. And put
More informationCryptography. and Network Security. Lecture 0. Manoj Prabhakaran. IIT Bombay
Cryptography and Network Security Lecture 0 Manoj Prabhakaran IIT Bombay Security In this course: Cryptography as used in network security Humans, Societies, The World Network Hardware OS Libraries Programs
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationCASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007
CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007 Lecture Hours: 2 Lab Hours: 2 Credit Hours: 3 Class Time: Saturday 8:30 AM - 12:00 PM Room: BU
More informationECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationObject-Oriented Programming for Managers
95-807 Object-Oriented Programming for Managers 12 units Prerequisites: 95-815 Programming Basics is required for students with little or no prior programming coursework or experience. (http://www.andrew.cmu.edu/course/95-815/)
More informationCS 361S - Network Security and Privacy Spring Homework #2
CS 361S - Network Security and Privacy Spring 2014 Homework #2 Due: 11am CDT (in class), April 17, 2014 YOUR NAME: Collaboration policy No collaboration is permitted on this assignment. Any cheating (e.g.,
More informationCS157a Fall 2018 Sec3 Home Page/Syllabus
CS157a Fall 2018 Sec3 Home Page/Syllabus Introduction to Database Management Systems Instructor: Chris Pollett Office: MH 214 Phone Number: (408) 924 5145 Email: chris@pollett.org Office Hours: MW 4:30-5:45pm
More informationCS 6903: Modern Cryptography Spring 2011
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2011 Nitesh Saxena NYU-Poly Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s11
More informationKris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646
646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:
More informationISM 324: Information Systems Security Spring 2014
ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method
More informationSan José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017
Course and Contact Information Instructor: Auston Davis Office Location: MacQuarrie Hall 217 Telephone: 650-454-6044 Email: Office Hours: Class Days/Time: auston.davis@sjsu.edu (preferred) Mon 6pm 7pm
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationCPSC 5157G Computer Networks
CPSC 5157G Computer Networks Instructor Dr. Jianhua Yang Center for Commerce and Technology 28 (706) 565 3520 e mail: yang_jianhua@colstate.edu website: http://csc.colstate.edu/yang/ Office Hours (Fall
More informationITSY 2330 Intrusion Detection Course Syllabus
ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office:
More informationLecture 7 - Applied Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 7 - Applied Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger
More informationCSE484 Final Study Guide
CSE484 Final Study Guide Winter 2013 NOTE: This study guide presents a list of ideas and topics that the TAs find useful to know, and may not represent all the topics that could appear on the final exam.
More informationData Security and Privacy. Topic 14: Authentication and Key Establishment
Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt
More informationNetwork Fundamentals and Design Fall Semester 2014
CS 2705 22573 Network Fundamentals and Design Fall Semester 2014 Instructor Kyle Feuz Office: TE 111C Phone: 801-626-7864 E-mail: kylefeuz@weber.edu Office Hours: T,TH:8:00-9:30 am Office Hours @ D2 314:
More informationIT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 341 Data Communications and Networking Principles Syllabus (Revised 08/14/2017) Section
More informationECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
646 Cryptography and Computer Network Security Course web page: Google Kris Gaj 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationSecure Programming I. Steven M. Bellovin September 28,
Secure Programming I Steven M. Bellovin September 28, 2014 1 If our software is buggy, what does that say about its security? Robert H. Morris Steven M. Bellovin September 28, 2014 2 The Heart of the Problem
More informationInformation Security CS526
Information CS 526 Topic 3 Ciphers and Cipher : Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA 1 Announcements HW1 is out, due on Sept 10 Start early, late policy is 3 total late days for
More informationWhen does RDBMS representation make sense When do other representations make sense. Prerequisites: CS 450/550 Database Concepts
CS-695 NoSQL Databases Fall 2015 Thursdays 1910 2150, Dragas Hall, room 2110 Instructor: Dr. Cartledge http://www.cs.odu.edu/ ccartled/teaching Big data is quadrupling every year!! Everyone is creating
More informationIntroduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017
Introduction to Cryptology ENEE 459E/CMSC 498R Lecture 1 1/26/2017 Syllabus Highlights Best way to contact me is via email: danadach@ece.umd.edu My office hours; Thurs 3:00-4:00pm, Friday, 12:00-1pm in
More informationENEE 457: Computer Systems Security 8/27/18. Lecture 1 Introduction to Computer Systems Security
ENEE 457: Computer Systems Security 8/27/18 Lecture 1 Introduction to Computer Systems Security Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland,
More information1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)
Dr. Jelena Mirkovic (Y-Ellen-a) University of Southern California Information Sciences Institute If you wish to enroll and do not have D clearance yet, send an email to CSci530@usc.edu with: o Your name
More informationCSE Computer Security (Fall 2007)
CSE 543 - Computer Security (Fall 2007) Lecture 1 - Introduction Professor: Trent Jaeger URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ Some bedtime stories This course We are going to explore why these
More informationECE573 Introduction to Compilers & Translators
ECE573 Introduction to Compilers & Translators Tentative Syllabus Fall 2005 Tu/Th 9:00-10:15 AM, EE 115 Instructor Prof. R. Eigenmann Tel 49-41741 Email eigenman@ecn Office EE334C Office Hours Tu 10:15-11:30
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics
Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationCHEM 31A (90285): General Chemistry Fall 2013
CHEM 31A (90285): General Chemistry Fall 2013 I. Lecture Lecturer: Office: A237 Cook Email: Erik.Ruggles@uvm.edu Office Hours: M W F: 10:30 11:30 am W F: 1:00 3:30 pm T Th: 9:30 11:30 am or by appointment
More informationCS535: Interactive Computer Graphics
CS535: Interactive Computer Graphics Instructor: Daniel G. Aliaga (aliaga@cs.purdue.edu, www.cs.purdue.edu/homes/aliaga) Classroom: LWSN B134 Time: MWF @ 1:30-2:20pm Office hours: by appointment (LWSN
More informationSyllabus CSCI 405 Operating Systems Fall 2018
Syllabus CSCI 405 Operating Systems Fall 2018 1.0 General Information Class Time: Monday/Wednesday/Friday 11:00 AM - 11:50 AM Class Location: 317 Thompson Instructor: Dr. Deepti Joshi; Office: 224 Thompson;
More informationManagement Information Systems
Management of Database Systems MIS 6230 Syllabus Fall 2017 Dr. David Olsen david.olsen@usu.edu 435.797.2349 Office Hours TR 1:30 2:30 pm or by appointment EBB 711 Introduction The purpose of this class
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationCHCSS. Certified Hands-on Cyber Security Specialist (510)
CHCSS Certified Hands-on Cyber Security Specialist () SYLLABUS 2018 Certified Hands-on Cyber Security Specialist () 2 Course Description Entry level cyber security course intended for an audience looking
More informationCSE 240 Introduction to Computer Architecture
What s All About?! Introduction to Computer Architecture The new CSE240: Not at 9am!!! New approach (bottom up) New textbook New instructor Well integrated into curriculum Cooler assignments (demo coming
More informationCS Computer Networks 1: Authentication
CS 3251- Computer Networks 1: Authentication Professor Patrick Traynor 4/14/11 Lecture 25 Announcements Homework 3 is due next class. Submit via T-Square or in person. Project 3 has been graded. Scores
More informationSyllabus Revised 08/21/17
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 445 Advanced Networking Principles II Syllabus Revised 08/21/17 Instructor: Pouyan
More informationCS 241 Data Organization. August 21, 2018
CS 241 Data Organization August 21, 2018 Contact Info Instructor: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Room 2120 of Farris Web site: www.cs.unm.edu/~vasek/cs241/
More informationLecture 3: Symmetric Key Encryption
Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07
More informationSecuring Internet Communication: TLS
Securing Internet Communication: TLS CS 161: Computer Security Prof. David Wagner March 11, 2016 Today s Lecture Applying crypto technology in practice Two simple abstractions cover 80% of the use cases
More informationOperating Systems Design Exam 3 Review: Spring Paul Krzyzanowski
Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.
More informationYou must pass the final exam to pass the course.
Computer Science Technology Department Houston Community College System Department Website: http://csci.hccs.cc.tx.us CRN: 46876 978-1-4239-0146-4 1-4239-0146-0 Semester: Fall 2010 Campus and Room: Stafford
More informationMGMT 4336 Networks & Data Communication Section D10
MGMT 4336 Networks & Data Communication Section D10 Course Description/Overview A first course in data communications and networking. Topics include: IP networks and services, comparative network configurations
More informationInformation Security CS 526
Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric
More informationME 478 Introduction to Finite Element Analysis
ME 478 Introduction to Finite Element Analysis Instructor: Dr. Alexander Veress Email: averess@u.washington.edu Office Hours: Tues. 10:00 11:20 a.m. MEB 309 TA: Michael Au Yeung Email: michael.auyeung@gmail.com
More informationECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationEECE.2160: ECE Application Programming Spring 2019
Course Meetings Section 201: MWF 8-8:50, Kitson 305 Section 202: MWF 12-12:50, Kitson 305 Course Website Main page: http://mjgeiger.github.io/eece2160/sp19/ Schedule: http://mjgeiger.github.io/eece2160/sp19/schedule.htm
More informationCSE 127: Computer Security Cryptography. Kirill Levchenko
CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified
More informationSyllabus CS476 COMPUTER GRAPHICS Fall 2009
Syllabus CS476 COMPUTER GRAPHICS Fall 2009 Text: Computer Graphics: Principles & Practice, by Foley, van Dam, Feiner, & Hughes(2nd Ed. in C) Changes will be made as necessary. Instructor: Hue McCoy TA:
More informationCHEM 31A (90366): General Chemistry Fall 2011
CHEM 31A (90366): General Chemistry Fall 2011 I. Lecture Lecturer: Office: A237 Cook Email: Erik.Ruggles@uvm.edu Office Hours: M T W Th F 11:30-12:30 pm or by appointment Lecture Time: M W F 9:35-10:25
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationModule: Return-oriented Programming. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security
CSE543 - Introduction to Computer and Network Security Module: Return-oriented Programming Professor Trent Jaeger 1 1 Anatomy of Control-Flow Exploits Two steps in control-flow exploitation First -- attacker
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course
More informationCSCE 441 Computer Graphics Fall 2018
CSCE 441 Computer Graphics Fall 2018 Meetings: Monday, Wednesday, Friday 9:10-10:00 a.m. Location: HRBB 113 Instructor: Dr. John Keyser Office: 527C, H.R. Bright Building Phone: 458-0167 Email: keyser@cse.tamu.edu
More informationAIT 682: Network and Systems Security. Instructor: Dr. Kun Sun
AIT 682: Network and Systems Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Associate Professor of Information Sciences and Technology http://csis.gmu.edu/ksun/ Phone: (703) 993-1715 Email:
More informationFaculty of Science & Information Technology
Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this
More informationCrypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))
Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote
More informationCIS SP Microcomputer Operating Systems Course Syllabus
CIS-152-101-13SP Microcomputer Operating Systems Course Syllabus Last Update 16 August, 2013 About This Course... 2 What You ll Learn... 2 The Books We ll Use... 2 Things You Need To Know... 3 When and
More informationCS 43: Computer Networks Security. Kevin Webb Swarthmore College December 7, 2017
CS 43: Computer Networks Security Kevin Webb Swarthmore College December 7, 2017 Topics Spying on network traffic Classic problem: buffer overflow attack Monetizing botnets Once upon a time The Internet
More informationCS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background
CS 134: Elements of Cryptography and Computer + Network Security Winter 2016 sconce.ics.uci.edu/134-w16/ 1 CS 134 Background 11:00-12:20 @ SSL 290 Discussions section as needed (must register!) Senior-level
More informationAdvanced Programming CMPS 109
Advanced Programming CMPS 109 Dr. Karim Sobh Computer Science Department Jack Baskin School of Engineering ksobh@cs.ucsc.edu Winter 2017 Basic Information Course Title: Advanced Programming (CMPS 109)
More informationModule: Introduction. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security
CSE543 - Introduction to Computer and Network Security Module: Introduction Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 2 Some bedtime stories 2 Some bedtime stories
More informationComputer Networking Course Introduction
Computer Networking Course Introduction Antonio Carzaniga Faculty of Informatics Università della Svizzera italiana September 20, 2017 Outline General course information Program Preliminary schedule Intro
More informationCIS*1500 Introduction to Programming
CIS*1500 Introduction to Programming CIS*1500 Learning to program The basic constructs of programming Programming in the C language Solving real problems Not just about coding! About me??? Some basic things...
More informationCoSci 487 SYLLABUS Introduction to Networks
CoSci 487 SYLLABUS Introduction to Networks Instructor: Mari Rettke samusher@aol.com 818-470-8419 Section: 11222 (lec) & 11233 (lab) The CompTIA Network + (N10-006 edition) examination measures necessary
More informationInformation Security: Principles and Practice Second Edition. Mark Stamp
Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1
More informationCISN 340 Data Communication and Networking Fundamentals Fall 2012 (Hybrid)
CISN 340 Data Communication and Networking Fundamentals Fall 2012 (Hybrid) Instructor: Kevin M. Anderson, MBA, CCAI, MCSE, MCDBA, Office Phone: (916) 650-2926 CNE, LCP, CIW Associate, Security+, N +, A
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationECE Introduction to Compilers and Translation Engineering
ECE 46800 Introduction to Compilers and Translation Engineering Instructor: Xiaokang Qiu Teaching Assistants: Chris Wright Office: EE 334C Office: EE 207 Fall 2018 Course Information Phone: 765-494-9987
More informationsymmetric cryptography s642 computer security adam everspaugh
symmetric cryptography s642 adam everspaugh ace@cs.wisc.edu computer security Announcement Midterm next week: Monday, March 7 (in-class) Midterm Review session Friday: March 4 (here, normal class time)
More informationSE 4472a: Information Security
Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a: Information Security Course Outline 2014-15 Description: This course provides an introduction to the
More informationCRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK
CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define
More information