||Research Hall - 435
||Mon 12-1pm or anytime by appointment
||CS 469 - 001 - 74853
||Robinson Hall B201
||C or better in CS 330, CS 367, and STAT 344. Students not
satisfying the prerequisites will be dropped from the class.
||See schedule page
||All grades will be posted to Blackboard. We will use
||Any communication from me to the class will use your
Catalog description: Covers the software
subsystems that are involved in defending computer systems. Studies
threats and architecting solutions against them, including but not
limited to access control and identity management, network and system
security, intrusion detection and recovery systems, monitoring and
Type: Senior Computer Science Elective
- Explain the threats that enterprise systems encounter.
- Describe the subsystems and components used for cyber security:
Firewalls, IDS/IPS, Identity Management, Access Control.
- Describe the metrics used to characterize the performance of the
security components and subsystems
- Distinguish between reactive and proactive cyber security
- Simulate the enterprise security environment
||1. Introduction to Computer
Security by Matt Bishop
You can read this FREE through GMU's Safari
GRADE APPEAL POLICY:
If you feel you deserve a better grade on an assignment, you can appeal
grade in writing. Written grade appeals will only be accepted within 7
you receiving the grade. The appeal should clearly explain why you feel
deserve a higher grade. I will never lower your grade due to an appeal,
may or may not raise your grade depending on your justification.
All homework must be received by the deadline. Late homeworks and
project deliverables will
be docked 10% per day.
HONOR CODE STATEMENT:
As with all GMU courses, this course is governed by the GMU Honor Code.
course, all assignments, exams, and project submissions carry with them
implicit statement that it is the sole work of the author, unless joint
explicitly authorized. Help may be obtained from the instructor or
students to understand the description of the problem and any
the solution, particularly the design portion, must be the student's
If joint work is authorized, all contributing students must be listed
submission. Any deviation from this is considered an Honor Code
as a minimum, will result in failure of the submission and as a
failure of the class.
In addition to the GMU Honor Code, students in Computer Science courses
must adhere to the Computer Science policies described on this wiki
Plagiarism is stealing the work of others and presenting it as your
includes written papers, but also computer programs, presentations,
anything that was not created by you should be referenced. When in
doubt, add a
reference. If you have any questions about whether you can or cannot
something you've found ask your professor or TA. If another student let
copy their work you are BOTH guilty. Any plagiarism violations will be
the Honor Committee. If you are found guilty of plagiarism twice in
university career you will be expelled. This is a very serious offense!
information about plagiarism is on the writing
and at plagiarism.org
If you feel the need to do
this for any reason, come talk to your professor and we'll work out a
plan. There is ALWAYS a better plan than plagiarizing!
This class will use automated
tools to detect
plagiarism (including written materials and source code).
If you are a student with a disability and you need academic
please see me and contact the Disability Resource Center (DRC) at
All academic accommodations must be arranged through that office.