Masks are required inside university buildings. You must also meet university vaccine or exemption requirements.
All students are expected and required to report to the COVID Reporter (https://covid.colostate.edu/reporter/) when:
Do not ask me as your instructor to report for you. It is your responsibility to report through the COVID Reporter promptly.
As your instructor I may not ask you about vaccination status or if you have COVID but you may freely volunteer to send me information from a public health official if you have been asked to isolate or quarantine.
When you complete the COVID Reporter, the CSU Public Health office is notified. Once notified, that office will contact you and, depending upon each situation, will conduct contact tracing, initiate any necessary public health requirements and notify you if you need to take any steps.
If you do not have internet access to fill out the online COVID-19 Reporter, please call (970) 491-4600.
For the latest information about the University’s COVID resources and information, including FAQs about the spring semester, please visit the CSU COVID-19 site https://covid.colostate.edu/.
There is no required text for this course as the materials covered are too broad to be covered by a single text book. Lecture notes will be made available at this site. Two recommended references are:
Other reference books that you may want to have a look at, are:
Syllabus |
Computer and system security, authentication, access control, privacy.
CS 556 introduces the principles of computer security. Information is an important strategic and operational corporate asset. These days computers and computer networks, are increasingly being used for storing and retrieving information. Some of these information may be of a sensitive nature. Consequently they need to have adequate security measures that can safeguard sensitive information. In this course, we will begin by investigating some of the security measures that can be employed to safeguard information. For the most part we will look into the theory that goes into designing these measures rather than studying security tools and techniques. This is because there are too many of those tools out there and they are changing frequently. The course examines how system designs, network protocols, and software engineering practices can result in vulnerabilities. The course explores how to better design and implement future systems in order to mitigate vulnerabilities. In addition, the course explores how to detect and mitigate vulnerabilities in existing systems.
Understanding security requires understanding system concepts such as memory and network access models, stacks, and buffers. Although the official pre-requisite for this course is CS 455 or an equivalent undergraduate course, this being an graduate level computer science course, students are expected to have broad understanding of different aspects of how computer systems work. It is strongly recommended that the student have a working knowledge in computer networks. The student should also feel comfortable with algorithmic concepts and modular arithmetic. If they do not, they are strongly encouraged to refresh their skills in these areas. Experimentation involving programming exercises in C/C++/Python and scripting languages is one of the activities of the course. Students should be ready with these skills.
By the end of the course, students should be able to:
The course is geared toward graduate students and seniors in computer science, math, and information technology students who already have exposure to system design principles.
Schedule
Following is
tentative schedule for this class. Note that as the term
progresses we are most likely to digress from this schedule quite
a bit. However, dates for term paper/project and exams are fixed
and will not change.
Week 1 -
Introduction, security concepts, privacy concepts, threats, risk modeling and
security services
Week 2 - Access control models: Discretionary and mandatory access control
Week 3 - Access control models: Covert channels, Side Channels and Chinese Wall
Week 4 - Access control models: Clark-Wilson, RBAC, ABAC
Week 5 - Introduction to cryptography
Week 6 - Secret key cryptosystems
Week 7 - Key escrow
Week 8 - Modular Arithmetic and Public key cryptosystems
Week 8 - Public key cryptosystems
Week 9 - Diffie-Hellman, RSA, El-Gammal, Elliptic Curves
Week 10 - Searchable Encryption
Week 10 - Message digests, Merkle hashes and Blockchain, digital signatures
Week 11 - Identification and authentication, Passwords, Biometrics
Week 11 - One-time passwords and challenge response schemes, Two (multi)-factor authenication
Kerberos
Week 12 - Kerberos, SSL, SSH
Week 13 - Wireless Security
Week 14- Privacy
Important
Deadlines
Please
familiarize yourself with the following deadlines related to exams
and term paper/project submission. These are firm deadlines. Due
dates for homework assignments will be announced as and when these
are assigned.
January 16, Tuesday |
First Day of Class |
January 30, Tuesday |
Term Paper / Topic
Identification |
February 27 Tuesday | Term Paper / Project Abstract
Due |
March 9, Saturday |
Spring Break Begins |
March 10, Sunday |
Takehome Midterm Examination Distributed |
March 17, Sunday |
Spring Break Ends |
March 17, Sunday |
Take Home Midterm Exam Due on CANVAS |
April 5, Tuesday |
Term Paper / Project Update |
April 12, Friday |
End Course Withdrawal ("W") Period, Repeat/Delete Deadline |
April 30, Tuesday |
Term Papers / Project Due |
April 30, Tuesday |
Take Home Final Examination Distributed
|
May 3, Friday |
Friday: Last Day of Classes; Semester Withdrawal Deadline
|
May 7, Tuesday |
Final Examination Due on CANVAS
|