ISA 767: Secure Electric Commerce
Spring 2009

Wednesday, 4:30 – 7:10 p.m.

Science & Tech I 127 and then Robinson B 224

Prerequisites: CS 555 and ISA 562 or equivalent

Dr. Edgar H. Sibley

Room 359, Science & Tech II

Office: 993-1669         Home: provided in class

esibley@gmu.edu

 

I shall normally be in my office from about 3 PM to 4.15 PM on Mondays and Wednesdays.  Other times will be made available by appointment (e-mailing me or call my office or home on other evenings to request a meeting).  All changes, grades, and announcements will be made on the web site or by e-mail.   

Objectives

The course focuses on security in general and on the web to protect e-commerce plus the management of IS having national or international connectivity.  Issues include legal, both local and international, cultural, and psychological factors.  Students are expected to participate by presenting material, discussing recent security issues, write short papers on issues, present a paper, and make a presentation on it.      

 

Grading

The elements of the course are weighted as follows:

Homework (4 at 25 each)

100

Major Paper

100

P resentation

100

Final Exam

200

Total

400

 

Text:

Security Enginerering by Ross Anderson, Second Edition; Wiley Publishing, Inc.

 

Provisional Outline

Homework given at dates with asterisks and are due two weeks later

Date

Topic

Jan 21*

Introduction: The topic area and discussion of paper

Read Chapters 1 and 2

Jan 28

Review of previous courses

Read Chapters 3, 4, 5, and 6

Feb 4*

Economics and OR principles

Read Chapter 7 HW 1 presented (due in 1 week)

Feb 11

Basic Security, Banking and Accounting principles

Read Chapters 8, 9, and 10

Feb 18*

Physical Security, Metering, and Command and Control Principles

Read Chapters 11, 12, and 13

Feb 25

Secure Currency and Biometrics

Paper due

Read Chapters 14 and 15

Mar 4*

Tamper Resistance, Tempesting, etc., and the API

Read Chapters 16, 17, and 18 HW 2 presented (due in 1 week)

Mar 18 23

Electronic Warfare and Telecomm Security

Read Chapters 19 and 20

Paper presentations start and go weekly to semester end

Mar 25 30

Networks and Intrusion Detection

Read Chapters 21

Apr 1

DRM, Intellectual Property, and the Bleeding Edge

Read Chapters 22,and 23 HW 3 presented (due in 1 week)

Apr 8

Critical Infrastructures, etc

Read Chapters 24

Apr 15

Managing Secure Systems

Read Chapter 25

Apr 22

Evaluation and Assurance

Read Chapter 26 HW 4 presented (due in 1 week)

Apr 29

Discussion and Final Exam (two hours)

Assignments

Homework must adhere to the defined page limit in the assignment using the Times Roman font at 12 points with 1.5 line spacing and one-inch margins at the sides, top, and bottom of the document.  They will be considered late if they are not uploaded to my e-mail (esibley@gmu.edu) by midnight of the date due.  I will not accept hardcopy in lieu of this.  Late papers will be assessed a penalty equivalent to one grade level per day. 

The content of assignments is expected to be the original work product of the student.  All sources must be cited appropriately in the context of their usage and according to the style guide chosen.  Quotes and their source must be identified.  The use of the work product of others without attribution constitutes plagiarism and is an Honor Code violation.  Please note that paraphrasing sources can be plagiarism if the sequence of ideas is not your own.  Any student engaging in plagiarism will receive a failing grade for the course, and be the subject of an Honor Code hearing.  Please refer to the University Honor Code available at http://www.gmu.edu/depts/unilife/honorcode.html for additional information.  To guard against plagiarism and to treat students equitably, assignments may be checked against existing published materials or digital databases available through various plagiarism detection services.

 

Last Modified Nov 19 08