Wednesday, 4:30 – 7:10 p.m.
Science & Tech I 127 and then Robinson B 224
Prerequisites: CS 555 and ISA 562 or equivalent
Dr. Edgar H. Sibley
Room 359, Science & Tech II
Office: 993-1669 Home: provided in class
esibley@gmu.edu
I shall normally be in my office
from about 3 PM to 4.15 PM on Mondays and Wednesdays. Other times will be made available by appointment (e-mailing
me or call my office or home on other evenings to request a meeting). All changes, grades, and announcements
will be made on the web site or by e-mail.
The course
focuses on security in general and on the web to protect e-commerce plus the
management of IS having national or international connectivity. Issues include legal, both local and
international, cultural, and psychological factors. Students are expected to participate by presenting material,
discussing recent security issues, write short papers on issues, present a
paper, and make a presentation on it.
Grading
The elements of the course are weighted as follows:
Homework (4 at 25 each) |
100 |
Major Paper |
100 |
P resentation |
100 |
Final Exam |
200 |
Total |
400 |
Text:
Security Enginerering by
Ross Anderson, Second Edition; Wiley Publishing, Inc.
Provisional Outline
Homework given at dates
with asterisks and are due two weeks later
Date
|
Topic
|
Jan 21* |
Introduction: The topic area and discussion of paper Read Chapters 1 and 2 |
Jan 28 |
Review of previous courses Read Chapters 3, 4, 5, and 6 |
Feb 4* |
Economics and OR principles Read Chapter 7 HW 1 presented (due in 1 week) |
Feb 11 |
Basic
Security, Banking and Accounting principles
Read Chapters 8,
9, and 10
|
Feb 18* |
Physical Security, Metering,
and Command and Control Principles Read Chapters 11,
12, and 13
|
Feb 25 |
Secure Currency and Biometrics Paper due Read Chapters 14 and 15 |
Mar 4* |
Tamper Resistance, Tempesting, etc., and the API Read Chapters 16, 17, and 18 HW 2 presented (due in 1 week) |
Mar 18 23 |
Electronic Warfare and Telecomm
Security Read Chapters 19 and 20 Paper
presentations start and go weekly to semester end |
Mar 25 30 |
Networks and Intrusion Detection Read Chapters 21 |
Apr 1 |
DRM, Intellectual Property, and the Bleeding Edge Read Chapters 22,and 23 HW 3 presented (due in 1 week) |
Apr 8 |
Critical Infrastructures, etc Read Chapters 24 |
Apr 15 |
Managing Secure Systems Read Chapter 25 |
Apr 22 |
Evaluation and Assurance Read Chapter 26 HW 4 presented (due in 1 week) |
Apr 29 |
Discussion and Final Exam (two
hours) |
Homework must adhere to the
defined page limit in the assignment using the Times Roman font at 12 points
with 1.5 line spacing and one-inch margins at the sides, top, and bottom of the
document. They will be considered late if they are not
uploaded to my e-mail (esibley@gmu.edu) by midnight of the
date due. I will not accept hardcopy in lieu of this. Late papers will be assessed a penalty
equivalent to one grade level per day.
The content of assignments is expected to be the original work product of the student. All sources must be cited appropriately in the context of their usage and according to the style guide chosen. Quotes and their source must be identified. The use of the work product of others without attribution constitutes plagiarism and is an Honor Code violation. Please note that paraphrasing sources can be plagiarism if the sequence of ideas is not your own. Any student engaging in plagiarism will receive a failing grade for the course, and be the subject of an Honor Code hearing. Please refer to the University Honor Code available at http://www.gmu.edu/depts/unilife/honorcode.html for additional information. To guard against plagiarism and to treat students equitably, assignments may be checked against existing published materials or digital databases available through various plagiarism detection services.
Last Modified Nov 19 08