Transcript intro

CIS 3360: Security in Computing
Cliff Zou
Spring 2012
Course Information

Course lecture time



Teacher: Cliff Zou (Associate Professor)




Office: HEC243 407-823-5015
Email: [email protected]
Office hour: MoWe 9am – 11am
Course Webpage:



Video recorded at MoWe 2pm – 3:15pm
Video released on UCF Tegrity server MoWe 5pm
http://www.cs.ucf.edu/~czou/CIS3360/index.html
Syllabus is on the course webpage and WebCourse
UCF Tegrity for online lecture video streaming
WebCourse has a Tegrity link
 Or you can directly login to Tegrity at:
https://tegrity.ucf.edu/TegrityUtils/Login.aspx

2
Course Information

Use Webcourse@UCF for homework
assignment and grading



Keep grade private
Homework submission
Also have a simple BBS channel for Q&A and
discussion among students
I will read the BBS twice a week to answer any
course related questions
 You can also directly email me for questions


Homework solutions will be posted on
WebCourse after their due date
3
Course in Degree Requirement



Required course for CS majors
Required course for IT majors
Required core course for MultiDisciplinary Minor in Secure Computing
and Networks (SCAN)


http://www.cs.ucf.edu/it/SCANminor.html
It has a face-to-face session as well
(taught by another faculty)
4
Objectives

The student will be able to






Explain what security in networked computing systems means.
Perform base conversions and arithmetic operations in
computer number systems.
Describe at a high level the vulnerabilities and threats in the
Internet and networked computing systems.
Encrypt, decrypt and transmit messages using cryptographic
techniques.
Apply methods to detect, prevent and repair attacks in
networked computing systems.
Determine when cyber activities are illegal and criminal. Also,
identify the laws and codes of ethics governing the protection of
information through copyrights, patents, trade secrets, and
trademarks
5
Course Materials

Textbook:

Reference books:






Introduction to Computer Security. M. Goodrich and
R. Tamassia, Addison Wesley, 2011.
J. Kurose and K. Ross, Computer Networking – A Top-Down
Approach, Fifth Edition, Addison-Wesley, 2010.
C. Pfleeger and S. Pfleeger, Security in Computing, Fourth
Edition, Prentice Hall, Inc., 2007.
Peter Szor, The Art of Computer Virus Research and
Defense, Symantec Press, Addison-Wesley, 2005.
M. Quinn, Ethics for the Information Age, Third Edition,
Addison-Wesley, 2009.
Other references that we can find online
6
Grading Policy

Coursework






times
Written homework
Programming projects
Midterm exam
Final exam
4
2
2
1
approx %
30%
25%
25%
20%
Grading will use +/-, i.e., A, A-, B+, B, B,….
Will use relative ranking among the whole
class for final GPA grade.
7
Exam Format


Since it is a fully online course, we cannot
do written exam on campus
Exams can be treated as special
homework assignments



Exam is released on WebCourse as an
assignment
Exam is due 24 hours after its release
You cannot discuss with another student for
solving exam

You can do it for normal homework assignments
8
Academic Honesty

Plagiarism and Cheating of any kind on an examination,
quiz, or assignment will result at least in an "F" for that
assignment (and may, depending on the severity of the
case, lead to an "F" for the entire course) and may be
subject to appropriate referral to the Office of Student
Conduct for further action. See the UCF Golden Rule for
further information.

The Golden Rule http://goldenrule.sdes.ucf.edu/
9

Questions?
10