Computer Science SYCS 653-01: Cybersecurity I Fall 2010 --- Howard University

shoulderslyricalΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 10 μήνες)

105 εμφανίσεις


Compute
r Science SYCS 653
-
01: Cybers
ecurity I

Fall 20
10

---

Howard University


Professor: Wayne Patterson


Syllabus


Cybersecurity, or computer s
ecurity, or information security, or information assurance is a rapidly growing field. The vastly
increased use

of the internet and the attendant problems with privacy and security have created enormous interest in this area.

You may note the official name of this course is Computer Security, but for all intents and purposes I will tend to use
Cybersecurity as a sy
nonym.


We will not be able to addre
ss all of the areas of cyber
security in this course. But we will try to address two of the most
important aspects, namely system security and data encryption.


Professor:
Wayne Patterson,
Special Assistant to the

Dean of

the Graduate School and Professor of Computer Science
.
My
office is
Room 110,
on the first floor of the Graduate School, Annex III, 4
th

and College Sts.
You can certainly call me there
and also meet by appointment if you wish. My
direct line phone
number
is

202
-
806
-
5518, but to leave messages use
202
-
806
-
6800
. FAX: 413
-
451
-
9837. Email:


wpatterson@howard.edu
. Residence: 202
-
546
-
8166.


Grading Scale:

60


69: C;

70


79: B;

80


100: A.


Logistics:

Class meets
generally Wednesdays, 6:
1
0


8
:
3
0 pm, Room 2006 Downing Hall


Evaluation:

There will be several assignments (value 40%), one test (value 20%), a final exam (value 40%).


Text:

The text is
Information

Security
: Principles and Practice
,

by
Mark Stamp, John W
iley and Sons, 2006
.

All of my lecture notes
will be available through Blackboard. A backup reference is the former text,
Security Engineering,
by Ross Anderson.
This text is
now online, so you have the option of
downloading

it. The website is
http://www.cl.cam.ac.uk/~rja14/book.html
.
A good
portion of the lecture notes will be drawn from my book,
Mathematical Cryptology
, published by Rowman and Littlefield, 1986.
Many of the assignments will also i
nvolve computational problems

and SYCS will have Mathematica 7 installed for our use. If
you would like a reading over the summer to prepare for the course, may I suggest the interesting chapter 2 (Usability and
Psychology) from the most recent edition of
the aforementioned Security Engineering. You may download it at
http://www.cl.cam.ac.uk/~rja14/Papers/SEv2
-
c02.pdf
.


Lectures:


1.

Computer Security Overview

2.

Passwords

3.

Biometrics

4.

Access Contr
ols

5.

Multilevel Security

6.

Multilateral Security

7.

Firewalls

8.

Intrusion Detection


9.

Cryptography Before 1970

10.

Symmetric Key Cryptography

11.

The Data Encryption Standard (DES)

12.

The Public Key Paradigm

13.

Knapsacks

14.

The RSA Approach to Public Key Cryptology

15.

Elliptic Curve C
ryptography

16.

The Advanced Encryption Standard (Rijndael)

17.

Hash Function
s

18.

The Digital Signature Standard