ISA562 Information Security Theory/Practice

Summer 2014

INSTRUCTOR INFORMATION

Instructor:

Dr. Avinash Srinivasan

O ce:

ENGR 5337

Phone:

703-993-1773

E-mail:

asriniv5 AT gmu dot edu

O ce Hours:

MW 3:00 - 3:45pm; or by appointment

 

 

COURSE INFORMATION

Course Title:

Information Security Theory/Practice

Course Number:

ISA562

Section:

A01

 

LECTURE INFORMATION

Building:

Planetary Hall

Room:

124

Day:

MTWR

Time:

4:00 PM - 6:40 PM

Credits:

3

Semester Dates:

May 19 { June 27

Reading Day:

June 25

Midterm Exam:

June 05

Final Exam:

June 26

 

 

TA INFORMATION: None

FIRM PREREQUISITES

INFS 501 Discrete and Logical Structures for Information Systems or equivalent; INFS 515 Computer Organization or equivalent; INFS 519 Program Design and Data Structures or equivalent SWE 510 Object-Oriented Programming in Java or equivalent OR Instructor/Program Director Permission

1

TEXTBOOK

Title:

Computer Security: Art and Science

Author:

Matt Bishop

Publisher:

Addison-Wesley, 1st edition (2002)

ISBN:

0201440997

 

 

ABOUT THE COURSE

This course is a technical introduction to the theory and practice of information security, which serves as the rst security course for the MS-ISA degree, is required as a prerequisite for all subsequent ISA courses (at the 600 and 700 levels) and subsumes most topics covered by the CISSP examination. Also serves as an entry-level course available to non-ISA students, including MS-CS, MS-IS, and MS-SWE students.

COURSE GOALS AND OBJECTIVES

At the end of this course, students will demonstrate knowledge of fundamental principles of information security and an ability to apply them in practice to provide the core security require- ments - Con dentiality, Integrity, and Availability, as well as additional security requirements including Non-repudiation.

COURSE GRADING POLICY

You will be graded on a total of 500 points.

200 points

Assignments

125 points

Midterm Exam

175 points

Final exam

Semester letter grade will be calculated using the scale below:

490

A+

465

A

450

A-

435

B+

420

B

400

B-

350

C

349

F

 

 

IMPORTANT NOTE: Late submissions will not be accepted for any homework assignments unless otherwise I have announced a deadline extension to all students in class.

COURSE POLICY

If you must miss the midterm or the nal exam then you must provide a written, veri able excuse that are beyond your control. In certain rare cases you may be able to makeup, if reason for missing is genuine and veri able. Reasons such as tra c, alarm, weather, family reunion, etc., are NOT acceptable.

2

COURSE OUTLINE (TENTATIVE)

Date

Lecture #

Topic(s) Covered

 

 

 

 

 

May 19

Lec-1

Course Introduction

 

 

 

 

 

May 20

Lec-2

Chapter-1: An Overview of Computer Security

 

 

 

 

 

May 21 & 22

Lec-3 & 4

Chapter-2: Access Control Matrix

 

 

 

 

 

May 26

Lec-5

NO CLASS - Memorial Day

 

 

 

 

 

May 27 & 28

Lec-6 & 7

Chapter-4: Security Policies

 

 

 

 

 

May 29

Lec-8

Chapter-5: Con dentiality Policies

 

 

 

 

 

June 02

Lec-9

Chapter-6: Integrity Policies

 

 

 

 

 

June 03

Lec-10

Chapter-7: Hybrid Policies

 

 

 

 

 

June 04

Lec-11

Chapter-7: Hybrid Policies

 

 

 

Midterm Review

 

 

 

 

 

June 05

Lec-12

Midterm Exam

 

 

 

 

 

June 09

Lec-13

Chapter-9: Basic Cryptography

 

 

 

 

 

June 10

Lec-14

Chapter-9: Basic Cryptography

 

 

 

Solutions to Midterm Exam

 

 

 

 

 

June 11 & 12

Lec-15 & 16

Chapter-10: Key Management

 

 

 

 

 

June 16 & 17

Lec-17 & 18

Chapter-11: Cipher Techniques

 

 

 

 

 

June 18

Lec-19

Chapter-12: Authentication

 

 

 

 

 

June 19 & 23

Lec-20 & 21

Chapter-15: Access Control Mechanisms

 

 

 

 

 

June 24

Lec-22

Final Exam Review

 

 

 

 

 

 

 

 

 

IMPORTANT NOTES

1.Exams are closed book, closed notes. Instructor may provide necessary information as handouts when appropriate. You are NOT allowed to bring any formula (equations) or cheat sheets on the exam.

2.Honor code violation on homework assignments will result in an \F" grade on the corre- sponding homework and referral to honor committee.

3.Honor code violation on the midterm exam will result in an \F" grade on the exam and referral to honor committee.

4.Honor code violation on the nal exam will result in an \F" grade on the exam and referral to honor committee.

5.You are required to use your mason email to communicate with me. This is very important to protect your privacy. For more information, please visit http://registrar.gmu.edu/privacy/

6.CS Dept. Honor Code: http://cs.gmu.edu/wiki/pmwiki.php/HonorCode/HomePage

3

ELECTRONIC DEVICE POLICY

Use of electronic devices are strictly restricted to referring to course material including lecture slides posted on blackboard. Electronic devices are limited to tablets and laptops. Cell phones cannot be used in place of laptops and tablets to access course material during lecture.

STUDENTS WITH DISABILITIES

If you have a documented learning disability or other conditions that may a ect academic performance you should make sure the necessary documentation is on le with the O ce of Disability Services (SUB I, Rm. 222; 993-2474; www.gmu.edu/student/drc) to determine the accommodations you need. Talk with me to discuss your accommodation needs but any ar- rangements necessary have to be made via the ODS.

CAMPUS RESOURCES

University Catalog:

http://catalog.gmu.edu/

University Policies:

http://universitypolicy.gmu.edu/

University Libraries:

http://library.gmu.edu/

The Writing Center:

http://writingcenter.gmu.edu/

Religious Holidays:

http://ulife.gmu.edu/calendar/religious-holiday-calendar/

Diversity Statement:

http://ctfe.gmu.edu/professional-development/mason-diversity-statement/

Academic Calendar:

http://registrar.gmu.edu/calendars/

Final Exam Schedule:

http://registrar.gmu.edu/calendars/2014spring/exams/

Honor Code:

http://oai.gmu.edu/the-mason-honor-code/

Disability Center:

http://ods.gmu.edu/

Counseling and

 

 

Psychological Services:

http://caps.gmu.edu/

 

 

 

4