Spring 2014 Fall 2013 Fall 2012 Fall 2011 Spring 2011 Fall 2010 Spring 2010 Fall 2009 Spring 2009 Fall 2008 Spring 2008 Fall 2007 Spring 2007

cs458 - Information Security - Spring 2014


Syllabus


Assignments

As described in the syllabus, you may submit optional work in order to boost your total number of points. In the table below you'll find assignments to choose from, the maximum number of points you can earn for each assignment, and aggregate results for each assignment (min, max, avg, etc.)

Assignment Max Points Deadline
HW-1 20 2/18/14
HW-2 30 2/18/14
HW-3 40 2/18/14
HW-4 40 2/18/14
HW-5 50 2/18/14
PA-1: GCD (Greatest Common Divisor) with Big Integers 30 4/8/14
PA-2: RSA 70 4/8/14
PA-3: Encrypting Network Traffic Using RSA 50 4/8/14
PA-4: Firewall 70 4/8/14
PA-5: Packet Sniffing 80 4/8/14
PA-6: Intrusion Detection System 150 4/8/14

New assignments may be added to this table as time goes by.


Class Presentations

Topics

No later than 2/11/14, each student must choose a topic for the class presentation.

You can use the categories below as a high level guide for things that may be of interest to you; let your instructor know if new categories and topics should be added to the list.

  • Network Security: Network Architecture, Firewalls, Virtual Private Networks (VPN), Wireless Security (WiFi, WiMAX, Bluetooth, cell phone, etc.), Intrusion Detection Systems and Network Intrusion Management, Penetration Testing, DNS Attacks, (D)DoS (including botnets), etc.
  • Identity Management: User ID and Password Management, Biometric IDs, Authentication, Access Control, Social Engineering, etc.
  • Platform Security: Vulnerability Management, OS security, Secure Data Storage, Cloud & Virtual Computing Security, etc.
  • Information Security Threats: Viruses, Worms and other malware, The anatomy of malware, Email Threats, Web Threats, RFID, Identity Theft, Data Security Breaches, Hacking Tools and Techniques, etc.
  • Application Security: Email Security, Web Security, Secure Instant Messaging, Database Security, Secure Software Development, Encryption Technology, VoIP Security, etc.
  • Open Source Security Tools
  • Forensics: DRM technology (including watermarking and fingerprinting of images, video and audio), Steganography and Steganalysis, Biometrics, Storage, etc.
  • Law and Policy: Privacy, Digital law, Digital warfare and national defense, Government surveillance, Police powers, etc.
  • Economics: Who makes money, how, and how much of it, and who spends the money, how much, and on what, etc.
  • Cyberwarfare: Who attacks whom, methods, defenses, retaliation, policy implications, etc.

Don't just select a category, instead select a topic that fits in one of the categories above. Be quite specific in what you want to do for your class presentation. For example "Web Threats" is not a good topic because there is too much to cover in this category and you only have very *limited time* to prepare and present; however "Cross-site Scripting", albeit still quite big, is something you can probably manage for the class presentation.

Schedule

A "Y" in the "Live Presentation?" column means you'll present in front of the entire class. A "N" in the same column means your work will be graded based on your electronic submission only, please read the syllabus for detail.


Links



$Id: cs458_spring2014.html,v 1.2 2014/03/02 02:53:35 virgil Exp $