Computer Science 182 jt
Computer Security
Syllabus --Spring 2006

Professor: Mike Erlinger
Office: Olin 1258b
Phone: 18912
E-mail: mike@cs.hmc.edu

Professor: Rett Bull
Office: Pomona
Phone: 18709
E-mail: rbull@cs.hmc.edu

Lecture Times: Tuesday/Thursday 1:15-2:30; TG 103

Lab TAs/Graders: Faculty and Students

Secretary: Joyce Greene, Olin 1258, 621-8225

Course Description

This course provides an overview of Computer Security. The material covered will include both theory and practice. As a seminar this course will depend on activity student participation. We will follow the course text, but supplement with numerous outside readings. Students should expect to give two presentations during the semester and also be responsible for a final project.

Course Text

We did order texts through Huntley Bookstore, but as usual the numbers may not be correct. We have created a relationship with Amazon.com where we put a link from the Web page to Amazon.com. Please note: Clicking on one of the Amazon links will take you directly to Amazon.com's Web site to order that book or any other book. Any book purchased via one of these links will generate a commission for the Computer Science department, which will be placed in the CS student activities fund. The money will directly benefit students NOT the faculty or the department. Using the link to order any book will also generate the commission.

There are obviously other places to purchase books, e.g., bookpool.com, so do what is best for you.

Computer Security, Art and Science by Matt Bishop Addison Wesley ISBN 0-201-44099-7 Buy the book from Amazon.com

Other Related Texts

Requirements and Grades

We have make great efforts to encourage you to submit material on time. Make sure to read the late policy. The relative weighting scheme will be as follows:
Participation : 15%
Homeworks : 20%
Presentations : 20%
Project : 45%

Participation

The Participation aspect of this course is designed to ensure that you are fully engaged with the material and the classroom activiites. Our goal is to get you to understand and to absorb the major concepts and technologies presented in the course. have a full grasp of the concepts presented in the text. We will go over problems in class. Student groups, picked randomly, will present solutions. Our goal is to get you to understand and to absorb the major concepts and technologies presented in the course.

Homeworks

The homeworks aspect of this course is fun and challenging. We will assign homeworks and go over some of them in the classroom. Homeworks will be chosen to keep your interest in the course material.

Presentations

There will be two group presentations tests. These will be around the current state of issues in Computer Security.

Project

Each student will be responsible for a final project. These will run the gamut from research papers to tool generation.

Collaboration Policy

Collaboration is encouraged. This means that you may discuss approaches to solving problems with anyone in the class, including myself and the graders. However, COPYING solutions from any source (person or book) is DISALLOWED. All students are expected to conduct themselves in accordance with the Harvey Mudd Honor Code. If you have any questions about what is appropriate or inappropriate collaboration, please talk to me. The copying of code applies to everything including the Labs.

Web Page

Obviously you should check the Web page periodically. Our plan is to keep it updated weekly, i.e., by Friday night the next week should be complete and subsequent weeks partially complete. Things way out may move, but they do show you the course direction. NOTE: We update the Calendar FIRST so it IS your primary source.

List of Topics

Mike Erlinger

Last Modified Tuesday, 03-Jan-2006 14:34:11 PST