EECE 412, "Introduction to Computer Security," is a fourth year undergraduate elective course that introduces students to the subject of computer security from the technical point of view. The purpose of this course is to help students in learning the principles of computer and information security in general and of constructing secure systems in particular.
The students are expected to learn:
When*: Tuesday and Thursday, from 4:00 PM to 5:25 PM; September 07, 2004 to December 03, 2004.
Where*: Forest Science Centre (FSC) 1221
All non-urgent announcements for the course are made in the appropriate discussion topics of the course's WebCT site. It's expected that all students check discussion topics at least every business day. Those urgent announcements that are better to be read same day are sent to the course's mailing list.
* -- subject to change, see the course's entry in the calendar |
Grading will be done according to the following break-down:
Module |
Grade %
|
In-class and online contribution to discussions | 10 |
Quizzes | 10 |
Mid-term examination | 20 |
Term project presentation at the mini-conference | 10 |
Term project | 30 |
Home assignments | 20 |
Dr. Konstantin Beznosov. Office hours by appointment.
Keith Krustowki
On completion of this course, students are expected to be able to:
Even though the following courses are formal pre-requisites for EECE 412, what you have to have is a reasonably good understanding of computer and software systems, which you might have gained through other similar courses or your own prior experience. If you have not taken these courses but have good knowledge of computers and software, talk to the course instructor to see if these formal requirements can be waived for you.
Students will be responsible for a final project. You must work in a group of three or four people.
The nature and the topic of the project is your choice, although it needs the approval of the teaching staff. For inspiration, you might want to look at the list of potential project topics found at the page of the term project module. We will generally approve interesting topics about network, computer, or software security.
A one or two-page written proposal for the project with an initial bibliography is due some time in week 6 (please see the course calendar for exact deadline information). It is advisable to get going early; we will gladly accept proposals before the deadline. This assignment gives us a chance to review and approve your project proposal, and to suggest references that you may have overlooked.
We also encourage you to arrange a short meeting with the course staff to discuss what you want to do for the project. The deadline for such a meeting is during week 5.
The last two or three classes (week 13) will be devoted to short presentations of each term project. Your written report is due by the end of week 13.
The are will be four problem sets posted about one week before the corresponding due dates. Solutions will be posted with corrected homework—hopefully within a week of the deadlines.
There will be both individual and group problem sets. You are to work on group problem sets and term projects in groups of three or four (preferably three). One problem set will be turned in by each group, and one grade will be given for each assignment. You must work in groups; assignments turned in by individuals or pairs will not be accepted. Be sure that you understand and approve the solutions turned in to each problem. Get your group organized as soon as you can, and email the composition of your group to the teaching staff.
If you have trouble finding a group, contact the staff. To prevent your group from falling apart, make sure everyone participates and that you all communicate on a regular basis. If you have a problem with a groupmate, talk to him/her first. If you are unable to make a compromise or your group does fall apart, talk to the staff.
Each group will present their term project to the rest of the class during a mini-conference at the end of the course. A tutorial on successful presentations will be held (probably during week 11). Prior to presenting your work in class, you will be asked to give a practice presentation to the course staff.
There will be two quizzes throughout the course. Quizzes will test your knowledge of material from lectures, home assignments, and readings.
There will be a mid-term closed-book examination during week 7.
Sessions will be a mix of lectures, Q&A, discussions, group and individual activities. Although attendance is not mandatory and will not be recorded, you are highly encouraged to participate actively since this will improve your understanding and retention of the material, as well as increase your participation grade.
Every student is expected to participate actively in the sessions and/or online discussions carried on between sessions on the discussion group of the course. Part of you final grade is determined by your participation. The following criteria will be used for assessing each student's participation:
Mark | Criteria |
---|---|
9-10 |
|
7-8 |
|
5-6 |
|
3-4 |
|
1-2 |
|
0 |
|
Each student is expected to read all required material for each session. There will be also optional reading for most sessions, which will help you to gain dipper and/or broader understanding of a particular topic.
Matt Bishop. Computer Security: Art and Science. Addison Wesley Professional. 2002.
Please see the page with additional resources for a list of recommended additional reading.