Computer and Network Security:Overview

CS 457/557 EE 410/510

Description

Attacks on networked computer systems are an increasingly important problem. This course covers the types of vulnerabilities that are present in modern computer systems and the types of malicious software that exploit these vulnerabilities. It also covers best practices for preventing, detecting and responding to such attacks including anti-virus software, defensive programming techniques, intrusion detection systems, honeypots and firewalls. Given when needed (typically every other spring).

Prerequisites

A general course in computer networking such as CS 455/555 or EE 407/507. Programming experience to the level of CS 142 or EE 361CS 344

Materials

There is no required textbook, but if you learn well by reading and would like to supplement what we do in class, I highly recommend Security Engineering by Ross Anderson.

We may collectively choose and read a book related to computer security. One option is This Is How They Tell Me the World Ends by Nicole Perlroth.

Objectives

Outcomes

Grading

Tentative grade breakdown:

Attendance Policy/Late Policy

If you complete an assignment late, you may submit it with a written note explaining the circumstances. I will grade your work, but the score will be recorded as a zero. I will however keep a special folder with the explanatory notes you have written and the score that would have been assigned if the work was submitted on time. At the end of the semester, before assigning final grades, I will consider reinstating or dropping the score for that assignment if it would indeed have changed the final grade.

If approved arrangements are made ahead of time to submit work late, this policy would not apply.

Academic Integrity

When working on an individual assignment, the work you submit must be your own individual work. When working in a group, the work submitted should be the result of the collaboration of group members and you should be prepared to describe your individual contributions. In either case, if you use or refer to work from other sources, it should be acknowledged including use of generative AI technologies.

It is an academic integrity violation for you to give your work to others. This includes sharing materials privately as well as making assignments available in Github or other public repositories.

Additional information about rights, obligations and procedures related to academic integrity can be found in Section IV of Clarkson's official regulations.

AccessABILITY Services and other campus services

If you need any accommodations in order to complete course requirements, I encourage you to contact the office AccessABILITY services. The Student Success Center is also a wonderful resource for inquiring about other acdemic support resources such as tuotring or help with writing.