Computer Science 182 jt
Computer Security
Syllabus --Spring 2006
Professor: Mike Erlinger
Office: Olin 1258b
Phone: 18912
E-mail: mike@cs.hmc.edu
Professor: Rett Bull
Office: Pomona
Phone: 18709
E-mail: rbull@cs.hmc.edu
Lecture Times: Tuesday/Thursday 1:15-2:30;
TG 103
Lab TAs/Graders: Faculty and Students
Secretary: Joyce Greene, Olin 1258, 621-8225
Course Description
This course provides an overview of Computer Security.
The material covered will include both theory and practice.
As a seminar this course will depend on activity student participation.
We will follow the course text, but supplement with numerous
outside readings.
Students should expect to give two presentations during the semester
and also be responsible for a final project.
Course Text
We did order texts through Huntley Bookstore, but
as usual the numbers may not be correct.
We have created a relationship with Amazon.com
where we put a link from the Web page to Amazon.com.
Please note: Clicking on one of the Amazon links will take you directly to
Amazon.com's Web site to order that book or any other book.
Any book purchased via one of these
links will generate a commission for the Computer Science department,
which will be placed in the CS student activities fund.
The money will directly benefit
students NOT
the faculty or the department.
Using the link to order any book will
also generate the commission.
There are obviously other places to purchase books,
e.g., bookpool.com,
so do what is best for you.
|
Computer Security, Art and Science
by
Matt Bishop
Addison Wesley
ISBN 0-201-44099-7
|
|
Other Related Texts
Requirements and Grades
We have make great efforts
to encourage you to submit material on time.
Make sure to read the
late policy.
The relative weighting scheme will be as follows:
Participation
The
Participation aspect of this course
is designed to ensure that you are fully engaged with the
material and the classroom activiites.
Our goal is to get you
to understand and to absorb the major concepts and technologies
presented in the course.
have a full grasp of the concepts
presented in the text.
We will go over problems in class. Student groups,
picked randomly, will present solutions.
Our goal is to get you
to understand and to absorb the major concepts and technologies
presented in the course.
Homeworks
The
homeworks aspect of this course
is fun and challenging.
We will assign homeworks and go over some of them in the classroom.
Homeworks will be chosen to keep your interest in the course material.
Presentations
There will be two group presentations tests.
These will be around the current state of issues in Computer Security.
Project
Each student will be responsible for a final project. These will
run the gamut from research papers to tool generation.
Collaboration Policy
Collaboration is encouraged. This means that you may
discuss approaches to solving problems with anyone in the class,
including myself and the graders.
However, COPYING solutions from any source (person or book) is
DISALLOWED. All students are expected to conduct themselves in
accordance with the Harvey Mudd Honor Code. If you have any questions
about what is appropriate or inappropriate collaboration, please talk
to me.
The copying of code applies to everything including the Labs.
Web Page
Obviously you should check the Web page periodically. Our plan is to
keep it updated weekly, i.e., by Friday night the next week should
be complete and subsequent weeks partially complete.
Things way out may move, but they do show you the course direction.
NOTE:
We update the
Calendar
FIRST so it IS your primary
source.
List of Topics
-
Course Overview -
Introduction;
Chapter 1
-
Foundations:
Access Control Matrix;
Chapter 2
Foundational Results;
Chapter 3
-
Policy:
Security Policies;
Chapter 4
Confidentiality Policies
Chapter 5
Integrity Policies
Chapter 6
Hubrid Policies
Chapter 7
-
Implementation 1: Cryptography
Basic Cryptography;
Chapter 9
Key Management;
Chapter 10
Cipher Techniques;
Chapter 11
Authentication
Chapter 12
-
Implementation II: Systems
Design Principles;
Chapter 13
Representing Identity;
Chapter 14
Access Control Mechanisms;
Chapter 15
Mike Erlinger
Last Modified Tuesday, 03-Jan-2006 14:34:11 PST