CS 469: Security Engineering

Contact Information

Instructor: Dan Fleck
Phone: 703-993-1543
GChat IM: dan.fleck.gmu
 
Office: Research Hall - 435
Office Hours: Mon 12-1pm or anytime by appointment

Class Information

Section: CS   469 - 001 - 74853
Time: 3:00-4:15 Mon/Wed
Location: Robinson Hall B201
Prerequisite: C or better in CS 330, CS 367, and STAT 344. Students not satisfying the prerequisites will be dropped from the class.
Schedule: See schedule page

Tools

Blackboard: All grades will be posted to Blackboard. We will use discussion forums.
MasonLive email: Any communication from me to the class will use your MasonLIVE account.

Course Description

Catalog description:  Covers the software subsystems that are involved in defending computer systems. Studies threats and architecting solutions against them, including but not limited to access control and identity management, network and system security, intrusion detection and recovery systems, monitoring and forensic systems.

Type: Senior Computer Science Elective


Outcomes:

Textbooks 

Computer Security book cover 1. Introduction to Computer Security by Matt Bishop
You can read this FREE through GMU's Safari Online

Grading Policies

Hw/Quizzes/Participation 20%
Research Paper/Project
20%
Midterm 25%
Final 35%


GRADE APPEAL POLICY:
If you feel you deserve a better grade on an assignment, you can appeal your grade in writing. Written grade appeals will only be accepted within 7 days of you receiving the grade. The appeal should clearly explain why you feel you deserve a higher grade. I will never lower your grade due to an appeal, but I may or may not raise your grade depending on your justification.

LATE POLICY:
All homework must be received by the deadline. Late homeworks and project deliverables will be docked 10% per day.

HONOR CODE STATEMENT:
As with all GMU courses, this course is governed by the GMU Honor Code. In this course, all assignments, exams, and project submissions carry with them an implicit statement that it is the sole work of the author, unless joint work is explicitly authorized. Help may be obtained from the instructor or other students to understand the description of the problem and any technology, but the solution, particularly the design portion, must be the student's own work. If joint work is authorized, all contributing students must be listed on the submission. Any deviation from this is considered an Honor Code violation, and as a minimum, will result in failure of the submission and as a maximum, failure of the class.

In addition to the GMU Honor Code, students in Computer Science courses must adhere to the  Computer Science  policies described on this wiki page.

PLAGIARISM:
Plagiarism is stealing the work of others and presenting it as your own. This includes written papers, but also computer programs, presentations, etc... anything that was not created by you should be referenced. When in doubt, add a reference. If you have any questions about whether you can or cannot use something you've found ask your professor or TA. If another student let you copy their work you are BOTH guilty. Any plagiarism violations will be sent to the Honor Committee. If you are found guilty of plagiarism twice in your university career you will be expelled. This is a very serious offense! More information about plagiarism is on the writing center website and at plagiarism.org. If you feel the need to do this for any reason, come talk to your professor and we'll work out a better plan. There is ALWAYS a better plan than plagiarizing!

This class will use automated tools to detect plagiarism (including written materials and source code).

DISABILITY STATEMENT:
If you are a student with a disability and you need academic accommodations, please see me and contact the Disability Resource Center (DRC) at 703.993.2474. All academic accommodations must be arranged through that office.