CSE 4471: Information Security

Table of Contents

1 Syllabus

  • Official Syllabus (PDF)
  • Textbook: Principles of Information Security by Michael E. Whitman and Herbert J. Mattord, 5th ed., Thomson/Cengage Learning, 2014.
  • Grading:
    • Homework: 15%
    • Course Project: 35%
    • Midterm Quiz: 15%
    • Final Exam: 35%
  • Class Policies (PDF). Please read this carefully, especially the late homework/lab submission policy (one day late: max 50% of grade; 0% thereafter).
  • We’ll use Piazza for class discussions. Class page on Piazza

2 Lectures

Lecture slides are in PDF format for maximum portability. You’ll need a PDF reader like Adobe Reader to read the slides. pdfreaders.org can point you to free PDF readers.

3 Programming Android Devices

4 Assignments

  • Homework 1 (PDF) (Due Thursday, Jun. 4, 2015 in class)
  • Homework 2 (PDF) (Due Thursday, Jul. 23, 2015 in class)
  • Homework 3: Short Presentations. Each student is required to give a 5-minute short presentation on recent information security related news published online after June 1, 2014. Preparation of slides for the short presentation is strongly recommended. All short presentations should be based on different news stories. The short presentations will be conducted during regular classes. Student registration for short presentations is on a first-come-first-served basis. All the short presentations should be given before August 2015. The score will be given based on (1) the relevance of the news to the course; and (2) the cogency of the presentation. Example presentation: DHS BOSS Project (PPT).

5 Class Project

NOTE: This is a semester-long project that entails programming mobile devices.

Project Deliverable Due Date Points
Written Project Proposal Thursday, May 21, 2015 0 points
Project Proposal Presentation Thursday, May 28, 2015 5 points
Mid-Semester Update Presentation Tuesday, June 23, 2015 10 points
Final Project Presentation Tuesday, July 28, 2015 10 points
Final Project Report Tuesday, July 28, 2015 10 points

6 Midterm Quiz: Thursday, Jun. 25, 2015 in class

7 Final Exam: Monday, Aug. 3, 2015, 180 Baker Systems, 4:00 p.m.–5:45 p.m.

8 References

8.1 General Security

“Only amateurs attack machines; professionals target people.” –Bruce Schneier

8.2 Threats and Attacks

8.3 Laws, Regulations, and Policies

8.4 Computer Networking

8.5 Mobile Device (In)security

8.6 Cryptography and Steganography

8.7 Forensic Investigations

Author: Adam C. Champion

Created: 2015-07-24 Fri 16:51

Emacs 24.5.1 (Org mode 8.2.10)