IT 263 / CS 391
Information Protection and Security

Fall 2005

MW 11:00-12:15, Speare 116

 

Instructor: Dr. Xiao Qin

 Speare 146, 505-5902, xqin@cs.nmt.edu  

Office hours: Tuesday 3:00-5:00pm

TA: Mais Nijim

Speare 109, 505-5127  mnijima@nmt.edu

 Office hours: Wednesday 3:15-5:15pm


                                General Information | Syllabus | Assignments | Lectures 


Announcements

  • Assignment 7 is now available. (Due 11:00AM, Wednesday, 12/7/2005 ) [Posted Wednesday 11/30/2005] 

  • The Study Guide for the final exam is updated. [Posted Monday 11/28/2005]

  • Assignment 6 is now available. (Due 11:00AM, Wednesday, 11/30/2005 ) [Posted Sunday 11/20/2005]

  • The Monday Class on Nov. 14th will be moved to Friday, Nov. 18th, usual time, Weir Hall 104. [Posted Wednesday 11/9/2005]

  • Assignment 5 is now available. (Due 11:00AM, Wednesday, 11/16/2005 ) [Posted Monday 11/7/2005]    

  • In response to many requests, we are extending the due day of assignment 4 to 11/10/2005 at 11:00AM. If you submitted your assignment 4 before 11:00AM on 11/7/2005, you will receive 5 points BONUS.  [Posted Monday 11/7/2005]

  • The grading criteria of assignment 4 is updated. [Posted Thursday 11/3/2005]   

  • Assignment 4 is now available. (Due 11:00AM, Monday, 11/7/2005 ) [Posted Sunday 10/23/2005]   

  • Related slides are available. [Posted Tuesday 10/18/2005] 

  • The Study Guide for the Midterm exam is updated. [Posted Wednesday  10/5/2005] 

  • Assignment 3 is now available. (Due 11:00AM, Wednesday, 10/5/2005 ) [Posted Monday 9/26/2005]   

  • Quiz 2 will be on Sept. 28. [Posted Monday 9/26/2005]

  • Assignment 2 is now available. [Posted Monday 9/19/2005]

  • Quiz 1 will be on Sept. 14. [Posted Monday 9/12/2005]

  • Assignment 1 is now available. [Posted Wednesday 9/7/2005] 

  • The webpage of IT 263 is launched. [Posted Sunday 8/21/2005]


Course Information

Students who have completed this course should be capable of doing the following:

  • learn how access to systems, resources, and data can be controlled;
  • understand the strengths, and weaknesses of cryptography as a tool of security;
  • learn about security in UNIX and programming environments;
  • learn how to attack a system, and to defend it by analyzing the system for vulnerabilities;
  • understand security issues in networks;
  • learn how to write basic security-related programs.

Topics Covered  (These topics may change)  

  • Basic components of computer security
  • Integrity models
  • Authentication
  • Malicious logic
  • Robust programming principles
  • Classical Cryptography
  • System Analysis
  • Principles of Secure Design
  • Vulnerability Models
  • High-Level Policy Languages
  • Key Exchange
  • Comparison of the Models

Prerequisite: IT 111 Introduction to Computer Science and Programming

Corequisite: IT 221 Computer and Network Organization


Office Hours: Dr. Qin will have office hours on Tuesday at 2:00-4:00p in his office (Speare 146). To get the most out of office hours, it is recommended to send an email in advance.


Textbook:  

  • Matt Bishop, “Introduction to Computer Security” by Addison-Wesley Professional, 2004, ISBN: 0321247442. 

  • Study Hints