Announcement:
Welcome to IS 302!
All teaching material is available in eLearn before
each class.
How do we
evaluate class participation?
The class
participation will be evaluated based on how actively students participate in
classroom discussions. Roughly, if the students are active in discussions, they
will get 9~10 points; if they participate in discussions occasionally, 7~8
points. Some points will be deducted if the students are absent from class with
no valid reasons.
Each team conducts an open-ended investigation on a topic assigned.
a)
Presentation 15%
a.
Presentation organization 5%
b.
Technical description 5%
c.
Easy to understand 5%
b)
Project report 10%
a.
Breadth 5%
b.
Depth 5%
–
Requirements: In both
presentation and report, each team should:
a) Describe the background of the related topic
b)
Identify major issues (problems, concerns,
questions) in the field
c) Address the identified issues with technical
details
d)
Provide your own comments and analyses
e) Give illustrative examples and case studies
where appropriate
f) List all references
The project
outline within 5 pages is due in week 9. The presentations are scheduled
in weeks 12 and 13. The final report is due on Monday in week 14.
Synopsis: This course provides both fundamental principles and technical skills
for analyzing, evaluating, and developing secure systems in practice. Students will learn essentials about security
models, algorithms, protocols, and mechanisms in applied cryptograph, computer
networks, and access control systems. Classroom instruction will be integrated
with hands-on exercises on security tools.
Text book: Security in Computing (4th/3rd edition) by Charles P. Pfleeger
and Shari L. Pfleeger, Prentice Hall (2007/2003)
Professor
Teaching Assistants and teaching schedule:
·
TBD
Office hour:
By appointment