ISA 562: Information
Security Theory and Practice
Instructor
Mohamed Sharif, PhD.
E-mail:
msherif@gmu.edu
Home: 571.333.8555
Teaching Assistant:
Course Description:
This
course is a broad introduction to the theory and practice of information
security. It serves as the first security course for the MS-ISA degree and is
required as a prerequisite for all subsequent ISA courses (at the 600 and 700
levels). It also serves as an entry-level course available to non-ISA students,
including
Course
Prerequisites
INFS 501, 515, 590, and SWE 510, or
permission of instructor.
Course Material
Required: Official
(ISC)2 Guide to the CISSP CBK
Required: Computer
Security: Art and Science, Matt Bishop. Addison-Wesley ISBN: 0201440997
Reference: Computer Security: Principles and Practice, by William
Stallings and Lawrie Brown
Reference: Security in Computing, 4/e, by C. Pfleeger
and S. Pfleeger
Reference: Network
Security, Private Communication in a Public World 2nd Edition by C. Kaufman,
R. Perlman and M. Speciner.
Reference: Corporate Computer and Network Security
by R. Panko
Reference: Network Security Essentials: Applications and Standards, 3/eby
W. Stallings.
Reference: Cryptography and Network
Security 2nd Edition by W. Stallings
Reference: Applied Cryptography 2nd Edition
by B. Schneier
Reference: Handbook of Applied Cryptography
by A. Menezes, P. van Oorschot
and S. Vanstone.
Reference: Designing Network Security by M.
Kaeo – Cisco Press
Reference: Internet & TCP/IP Network
Security by U. Pabrai and V. Gurani.
Reference: Fundamentals of Computer
Security Technology by E. Amoroso
Reference: Building Internet Firewalls by
D. Chapman and E. Zwicky
Reference: Firewalls and Internet Security
by W. Cheswick and S. Bellovin
Reference: The CERT Guide to System and
Network Security Practices by J. Allen
Reference: WWW.Security
by R. MacGregor, A. Aresi
and A. Siegert
Reference: Inside Internet Security by J. Crume
Reference: Secure Commerce on the Internet
by V. Ahuja
Some helpful Links: Material available at
the Bishop Companion
Site and Stallings Companion
site by Stallings.
Grading policy
Weights, Five or four quizzes 30% total,
one midterm Exams 30% each, Final exam 40%.
No exam make up will be given
Late Submissions: Discouraged but allowed
under exceptional circumstances with prior approval of the instructor.
Incompletes: No Incompletes will be given.
Except extreme case
Honor Code Violations: All violators will
be reported under all circumstances, and results in a course grade of F, in
addition to any other penalties imposed by the university and/or the CS
department.
Two students submitting a common or
significantly similar copy of homework is a honor code
violation.
Course
Administration
Class Meetings: Thursday 07:20 – 10:00 PM
in Loudoun 1 RM 232
Instructor Office Hours: by appointment
Examinations: All Examinations are in
class, individual (no collaborations), closed book, neighbor and notes.
Announcements
Additional Handout
Approximate Course Schedule
Date |
Topic |
|
Giving Out |
Due in Class |
Week 1 |
Ch 1 |
|
|
|
Week 2 |
Ch 2, 3, 15 |
|
|
|
Week 3 |
Ch 2, 3, 15 |
|
|
|
Week 4 |
Ch 4 |
Quiz 1 |
|
|
Week 5 |
Ch 5 |
|
|
|
Week 6 |
Ch 6 |
|
|
|
Week 7 |
Ch 7 |
Quiz 2 |
|
|
Week 8 |
No
class (Spring
Recess)
|
|
|
|
Week 9 |
Exam 1 |
|
|
|
Week 10 |
Cryptography
|
Ch 9 |
|
|
Week 11 |
Ch 10, |
|
|
|
Week 12 |
Network Security |
Ch 26 |
Quiz 3 |
|
Week 13 |
Transport/
application Security |
Ch 11 |
|
|
Week 14 |
Authentication
and DB security |
Ch 12 |
|
|
Week 15 |
System and user
Security & Physical security |
Ch 27 & 28 |
Quiz 4 |
|
Week 16 |
Final |
|
|
|