CS 410 and CS 591 - 001
Computer Security
Course Catalog Description
A broad overview of the principles, mechanisms, and implementations of computer security. Topics include cryptography, access control, software security and malicious code, trusted systems, network security and electronic commerce, audit and monitoring, risk management and disaster recovery, military security and information warfare, physical security, privacy and copyrights, and legal issues.
Course Learning Outcomes
To learn the principles, mechanisms and implementation of information and communication security in computer systems and networks.
Understand the fundamentals of cryptography and its deployment.
To learn the up-to-date security protocols and explain the design criteria and possible flaws behind them.
Understand the security threats and their countermeasures.
To learn to build secure software and systems.
To learn programming techniques for security protocols.
Evaluation Plan (subject to change)
Your final grade will be a weighted average of:
Quizzes and Exams – 90%
Projects and Assignments – 10%
Your final grade will be:
Grade A : 4.000 : ≥ 90%
Grade A − : 3.667 : ≥ 80% and < 90%
Grade B + : 3.333 : ≥ 70% and < 80%
Grade B : 3.000 : ≥ 60% and < 70%
Grade B − : 2.667 : ≥ 50% and < 60%
Grade C + : 2.333 : ≥ 40% and < 50%
Grade C : 2.000 : ≥ 30% and < 40%
Grade C − : 1.667 : ≥ 20% and < 30%
Grade D + : 1.333 : ≥ 10% and < 20%
Grade D : 1.000 : > 0% and < 10%
Grade F : 0.000 : ≤ 0%
Note: The above percentages are tentative. There may be significant changes.
Class Schedules (Room 0320)
Monday - 12:00 Noon - 01:15 P.M.
Wednesday - 12:00 Noon - 01:15 P.M.
Office Hours / Meeting Times (Room A0409G)
Monday - 10:00 A.M. - 11:30 A.M. and 2:00 P.M. - 3:30 P.M.
Wednesday - 10:00 A.M. - 11:30 A.M. and 2:00 P.M. - 3:30 P.M.
Approx. Semester Plan - Click here
Key Points About Course Policy
Prerequisites:
Familiarity with programming in a C-family language (C, C++), Java and Python.
Basic understanding of Networking, Operating Systems, Algorithms, Data Structures, Computer Organizations, and Computer Architectures is expected.
Attendance Expectations:
Attendance at every lecture is mandatory.
Students must arrive on time, stay for the entire class period, and actively participate in in-class activities.
Lateness, early departure, and non-participation are highly discouraged.
Course Format:
Lectures, discussions, programming assignments, and a final project are integral parts of the course.
Both individual and group activities enhance understanding of theoretical concepts and practical skills in distributed systems development.
CS Department Lab Hours:
The CS Department lab is unavailable during evenings and weekends.
Students must plan their work accordingly if they intend to use the lab facilities.
Electronic Lab Submission:
Instructions will be provided for electronically submitting labs and programs for grading.
Failure to adhere to instructions may result in a score of zero for labs.
Assessment:
Evaluation includes programming assignments, quizzes, exams, and the final project.
Active participation in class discussions and group activities is also assessed.
Quizzes and Assignments:
Regular quizzes and assignments assess comprehension of course material.
Implementing and practicing code snippets and problems discussed in class is expected.
Importance of Assignments:
Completing assignments is crucial for effective learning and successful exam performance.
Timely Completion:
Initiating projects and assignments promptly is crucial to meet deadlines, which will be strictly enforced.
Late Submissions Policy:
Late submissions result in penalties.
The maximum attainable score decreases by 20% for each day of late submission following the deadline.
Exam Integrity:
Exams must be completed independently, without assistance or communication.
Dates will be posted and may change.
Exams cover cumulative concepts from readings, course materials, and activities.
Missing an exam without sufficient documentation results in a score of 0.
In emergencies with appropriate documentation, alternative arrangements may be considered.
Understanding Cheating:
Cheating on programming assignments is a significant concern.
Familiarize yourself with the CS Department's webpage on Academic Dishonesty, which provides detailed definitions of cheating.
Consequences of Cheating:
Cheating results in a zero for the assignment, potentially affecting eligibility for exams.
A second violation leads to an immediate 'F' for the course.
Academic Integrity Code:
Students must uphold academic honesty.
Any involvement in copying during quizzes, midterms, or final exams results in a zero for the respective exam.
Syllabus Change Policy:
The syllabus is a guide and may be modified with prior notice.
Textbook Requirement:
Access to designated textbooks is mandatory.
Students are expected to read assigned sections, as material from the texts may be included in assessments, even if not covered in lectures.
Textbooks
William Stallings, Cryptography and Network Security: Principles and Practice, Pearson
Behrouz A. Forouzan and Debdeep Mukhopadhyay, Cryptography and Network Security, McGraw-Hill
M. Whitman and H. Mattord, Principles of Information Security, Cengage
References
Sarhan M. Musa, Network Security and Cryptography, Mercury Learning and Information
B. Forouzan, “Data Communication and Network”, McGraw-Hill
A. S. Tanenbaum., “Computer Networks”, Pearson
W. Stalling, “Data and Computer Communication”, Pearson
Future References
Additional research papers and online resources will be provided throughout the course.
Note: The lectures, homework assignments, quizzes, and other announcements will be made available through Email, D2L, and the course webpage. Posting any course materials, including solutions, homework, and labs, on public websites without permission is a violation of course policy and the instructor’s copyright.
Emergency Procedures
Southern Illinois University Carbondale (SIUC) is committed to fostering a welcoming and inclusive campus environment, ensuring a space free from discrimination and intimidation for all. The university offers essential support for students with disabilities through the Office for Access and Accommodations and provides tailored assistance to military community members via Veterans Services. The Student Multicultural Resource Center champions diversity and inclusion, while the Saluki Cares program offers a robust support network for students in distress. SIUC prioritizes safety and awareness, maintaining strict policies against violence and harassment under Title IX, and offers mental health services through Counseling and Psychological Services (CAPS). Additionally, the university provides extensive academic support, including tutoring, writing assistance, and advisement, to help students succeed. For more details, please refer to the Syllabus Attachment for Spring 2025.
Major Topics Covered in the Course (Tentative)
Module I
Approx. Number of Classes - 14
Introduction To Information Security: security goals, types of threats, security policies models, security standards, Physical security, operational security, ethical and legal issues in security.
Introduction to System security: access control, authentication and authorization, file protection, intrusion detection, trusted computing and digital rights management, UNIX security.
Introduction to Program security: buffer overflow attacks, viruses and worms, Trojan horses, proof-carrying code, sandboxing, Java security.
Introduction to Network Security: security goals, types of threats, security policies models, security standards, Physical security, operational security, ethical and legal issues in security.
Cryptography: classical ciphers stream and block ciphers, public-key encryption, hashes and message digests, signature schemes, key establishment and management, PKI
Module II
Approx. Number of Classes - 14
Application Layer Security: Introduction to E-mail architecture, Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extension (S/MIME)
Transport layer Security (TLS): Secure Socket Layer (SSL) - Architecture, Message Formats, Four protocols
Network Layer Security (IPSec): Authentication Header (AH) and Encapsulation Security Payload (ESP), Security Association, Internet Key Exchange (IKE) Protocol, ISAKMP (Header Formats and Payloads)
Network security: Virtual Private Networks, Sniffing and Spoofing, Denial-of-Service Attacks
Firewall: Need and Characteristics, Types, Firewall Basing, Firewall Location and Configurations
Secure Electronic Transaction (SET), Digicash, Electronic commerce wireless security
Module III
Approx. Number of Classes - 1
Important Tools and Commands:
Netstat: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/netstat
Ping: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/ping
Traceroute: https://en.wikipedia.org/wiki/Traceroute
Wireshark: https://www.wireshark.org
Filezilla: https://filezilla-project.org
Putty: https://www.putty.org
IP adress Trace: https://whatismyipaddress.com or https://www.whatismyip.com
Top ten important tools and commands: