DAKOTA STATE UNIVERSITY

COLLEGE OF BUSINESS AND INFORMATION SYSTEMS

 

CIS-414-D02 Computer Security Fundamentals, Fall 2006

 

 

Instructor:

Dr. Xinwen Fu

Office: 

302D, East Hall

Phone: 

256-5820

E-Mail: 

Xinwen.Fu@dsu.edu         

Homepage: 

http://www.homepages.dsu.edu/fux/

Office Hours: 

Tue. Wed. Thu. Fri. 3:45PM ~ 5:45PM

 

Course:

Computer Security Fundamentals

Credits:

3.00

Duration:

08/28/06 - 12/15/06

Time:

Tuesday, Thursday; 11:00AM - 12:15PM

Location:

East Hall, Room 206

 

NOTICE: Please follow rules and laws of the IA lab, DSU, South Dakota State and USA.

 

If you are not sure about legal issues, please never try tricks you learn in this class on any other people’s machines, even on your own laptop based on DSU policies. If you find any violation of laws and rules in our class, please report to me ASAP. If you apply attacks to other people’s machines and police finds you, I will not be responsible for it. This class is for securing systems, not attacking people.

 

COURSE DESCRIPTION

Provides students with a fundamental knowledge of computer security essentials in critical and diverse security areas, including security terminology, viruses, popular operating system vulnerabilities, Web browser vulnerabilities, security standards, and computer fraud.

 

COURSE PREREQUISITES:

Prerequisites: CIS 385 Networking II

Technology Skills:

1.      C and other programming languages

2.      Linux operating systems (Redhat)

3.      Linux software installation

4.      Knowledge of networks

 

DESCRIPTION OF INSTRUCTIONAL METHODS:

·      The course web site is located within WebCT (http://webct.dsu.edu/).

·      Announcements, questions (and answers, etc. will be available through WebCT.

·      Lecturing is based on the textbook with learning materials provided.

·      Security techniques are practiced remotely or in lab.

·      Discussions and questions/answers take place through WebCT, which should be checked approximately once every 48-hours. 

·      A Chat room is also likely to be used from time to time.

·      You will be expected to be prepared for class, and you must complete the assignments by the dates due.

 

COURSE REQUIREMENTS:

Textbooks

Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, ISBN: 0-13-046019-2.

Textbooks may be purchased at the bookstore or electronically through: http://www.amazon.com or some other booksellers.

 

Class Attendance Policy

Students are expected to attend and participate in class. Attendance may be verified by quizzes delivered through WebCt or in class. There will be no make-up opportunities for missed quizzes.

 

Cheating and Plagiarism Policy

All forms of academic dishonesty will result in an F for the course and notification of the Academic Dishonesty Committee.  Academic dishonesty includes (but is not limited to) plagiarism, copying answers or work done by another student (either on an exam or assignment), allowing another student to copy from you, and using unauthorized materials during an exam.

 

Make-up Exams (and Quizzes)

·      Make-up exams will only be given in case of serious need and only when the instructor is notified prior to the exam time. If this is not done, the grade is automatically zero for that exam/quiz.

·      Written verification for the student’s inability to take an exam will be required.

·      The make-up exams will be different from those given to the class.

·      There are no make-up quizzes.

 

University Deadlines

Sept. 1 (Fri)

Last day to drop a first half semester class and receive 100% refund

Sept. 7 (Thu)

Last day to add/drop a full semester class and receive 100% refund

Oct. 4 (Wed)

Last day to withdraw from a first half semester class and receive a grade of “W”

Oct. 27 (Fri)

Last day to drop a second half semester class and receive 100% refund

Nov. 13 (Mon)

Last day to withdraw from a full semester course or school and receive a grade of “W”

Nov. 30 (Thu)

Last day to withdraw from a second half semester class and receive a  grade of “W”

 

COURSE GOALS:

By the end of this course, students will be able to:

1.      State the basic concepts in information security, including security policies, security models, and various security mechanisms.

2.      Explain the basic number theory required for cryptographic applications as well as various cryptographic systems.

3.      Manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm.

4.      Manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie-Hellman, and DSA algorithms.

5.      State the requirements and mechanisms for identification and authentication.

6.      Explain and compare the various access control policies and models as well as the assurance of these models.

7.      State the characteristics of typical security architectures, including multi-level security systems.

8.      State the criteria of evaluating secure information systems, including evaluation of secure operating systems and secure network systems.

9.      List the database security issues and solutions, including models, architectures, and mechanisms for database security.

10.  List network and distributed systems security issues and solutions, including authentication, key distribution, firewalls, and network security protocols.

11.  Explain the network access control mechanisms, including the basic concepts of firewalls, packet filters, application gateways, and typical firewall configurations

12.  Design firewall configurations and rules to protect a given network

13.  Outline the protocols, i.e., AH and ESP protocols, for IP Security and the two modes for both protocols.

14.  Explain in their own words the goals of IP Security protocols (AH and ESP)

15.  Use combinations of IP security protocols to achieve a given security goal (e.g., source authentication, content authentication, traffic confidentiality, etc.)

16.  Explain SSL and TLS protocols.

17.  Apply the above protocols to protect transport-layer communication.

18.  State program security issues, including virus, worm, and logical bombs

19.  State the basic concepts and general techniques in security auditing and intrusion detection

20.  State the issues related to administration security, physical security, and program security

21.  Determine appropriate mechanisms for protecting information systems ranging from operating systems, to database management systems, and to applications

 

EVALUATION PROCEDURES

Components of Course Grade:

Quizzes (5~15)

20

Assignments (5)

30

Midterm

20

Term Project/Presentation

30

 

Grade Scale

90.0 ~ 100.0

A

75.0 ~ 89.9

B

60.0 ~ 74.9

C

50.0 ~ 59.9

D

< 50

F

 

Homework Assignments

·      All assignments are to be turned in on or before the due date and time. If you try and cannot turn in an assignment electronically because the campus network is down, you will not be penalized.

·      An assignment turned in up to 24-hours late will be reduced by 10% of the assignment’s worth, more than 24 hours late will be reduced 100%.

·      The due date and time for each assignment will be specified on assignment postings.

·      All assignments are expected to be individually and independently completed. Should two or more students turn in substantially the same solution or program, in the judgment of the instructor, the assignment will be given a grade of zero. A second such incident will result in an F grade for the course.

·      All assignments are to be turned in through WebCT.

 

Exams/Quizzes

·      Exams and quizzes will be based on textbooks, web sites, and assignments.

·      All exams are close book, but you can bring one page of cheat sheet (double sides, letter size).

·      The tentative exam format will be true/false, multiple choice, fill-in-the-blanks, programs, and/or short essays.

 

EARLY ALERT STATEMENT

Academic Success Support

As your professor, I am personally committed to supporting YOUR academic success in this course.  For that reason, if you demonstrate any academic performance or behavioral problems which may impede your success, I will personally discuss and attempt to resolve the issue with you.  If the situation persists, I will forward my concern to the Student Development Office and your academic advisor to seek their support and assistance in the matter.  My goal is to make your learning experience in this course as meaningful and successful as possible.

 

Americans with Disabilities Act (ADA) Statement

If you have a documented disability and/or anticipate needing accommodations (e.g., non-standard note taking, test modifications) in this course, please arrange to meet with the instructor. Also, please contact Dakota State University’s ADA coordinator, Keith Bundy in the Student Development Office located in the Trojan Center Underground or at 256-5121, as soon as possible. The DSU website containing additional information, along with the form to request accommodations is http://www.departments.dsu.edu/disability_services/. You will need to provide documentation of your disability. The ADA coordinator must confirm the need for accommodations before officially authorizing them.    

 

WIRELESS MOBILE COMPUTING INITIATIVE (WMCI) STATEMENT

The tablet PC will be used as a supplementary instructional device.  This technology will be valuable in the classroom and you are strongly encouraged to bring a wireless computing device to class to achieve the full educational benefit of in-class assignments.

 

LINKS TO OTHER SOURCES OF INFORMATION:

 

Graduate Catalog:  http://www.departments.dsu.edu/registrar/catalog/

Library:  http://www.departments.dsu.edu/library/

Computer Services Support: http://support.dsu.edu/

Student Handbook: http://www.departments.dsu.edu/student_services/handbook/

Semester Calendar: http://www.departments.dsu.edu/registrar/catalog/schedule/

DEWT Student Guide: http://www.departments.dsu.edu/disted/studentguide/guide.htm

 

TENTATIVE CLASS SCHEDULE

The schedule may be adjusted based on the actual progress in the semester.

 

Date

Content

Reading Assignment

Homework Assignment

Aug. 29

Introduction

 

 

Aug. 31

Physical Security

1st page of references on this part of slides

 

Sep. 5

Sep. 7

Basic Security Concepts

Chapter 1

 

Sep. 12

Sep. 14

Introduction to Cryptography

Chapter 2

 

Sep. 19

Sep. 21

Secret Key Cryptography

Chapter 3

 

Sep. 26

Sep. 28

Modes of Operation

Chapter 4

 

Oct. 3

Oct. 5

Hash and Message Digests

Chapter 5

 

Oct. 10

Oct. 17

Number Theory

Chapter 7

 

Oct. 19

Oct. 24

Public Key Cryptography

Chapter 6

 

Oct. 26

Oct. 31

Overview of Authentication

Chapter 9

 

Nov. 2

Authentication of People

Chapter 10

 

Nov. 7

Nov. 9

 

Assessment day (no class)

Nov. 14

Security Handshake Pitfalls

Chapter 11

 

Nov. 16

PGP – Pretty Good Privacy

Chapter 20~22

 

Nov. 21

Nov. 23

Thanksgiving Day (no class)

Nov. 28

 

 

Nov. 30

PKI – Public Key Infrastructure

Chapter 15

 

Dec. 5

Dec. 7

 

TBD

Dec. 14

Presentation as Final Exam

10:10AM ~ 12:10PM