Tue. and Thur. 8:30am -- 9:55am, SL210 (Science Library)
Office: T6, Engineering building
Office Hours: Thur. 8am - 8:25am Fri. 10:30am-11:30am
Office: N1, Engineering building
Office Hours: Mon. Wed. Fri. noon - 1pm
This course provides a broad introduction to network, computer and information security. Topics covered by this course may include:
- Introduction to network and socket programming
- Cryptography: encryption and decryption techniques, key management, digital signature, authentication protocols
- Network Security Applications: email security, web security, security of online banking systems
- System Security: intrusion detection, malicious software (virus, worms, rootkits, trojan horses), password management
- Attacks: buffer overflow attack, SQL injection attack, memory sniffing attack
- Security Policies and Principles: confidentiality, integrity, availability, access control
- Cloud Computing security, virtual machine security
William Stallings Cryptography and Network Security Principles and Practice, Fourth/Fifth Edition. ISBN-10:0-13-187316-2, ISBN-13: 978-0-13-187316-2
gcc, g++, Java, and Openssl are available on bingsuns.binghamton.edu.
Course slides will be available on the blackboard
All assignments will be posted on the blackboard. Programming assignments will be done individually. Written assignments will be done by a group of two students. No assignment will be accepted after 24 hours from the deadline. Late assignments will be penalized 10%.
Assignments: 40% Course Project: 18% Exam 1: 18% Exam 2: 24%
Final grade will be curved over the entire class. The TA will grade assignments, quizzes, and programming projects. If you have questions about the grading of assignments and quizzes, please first contact the TA. This is used to ensure consistent grading. If the issue has not been resolved by the TA, then talk to the instructor, preferably during office hours. Questions regarding exams, and final grades should be addressed to the instructor.
All students should follow Student Academic Honesty Code (if you have not already read it, please read it carefully). All forms of cheating will be treated with utmost seriousness. You may discuss the problems with other students, however, you must write your OWN codes and solutions. Discussing solutions to the problem is NOT acceptable. Copying an assignment from another student or allowing another student to copy your work may lead to an automatic F for this course. You need ensure that your code and documentation are protected and not accessible to other students. Use chmod 700
command to change the permissions of your working directories before you start working on the assignments. If you have any questions about whether an act of collaboration may be treated as academic dishonesty, please consult the instructor before you collaborate.