IS 302: Information Security and Trust

Term 2, 2015~2016


Announcement:

Welcome to IS 302!

All teaching material is available in eLearn before each class.

How do we evaluate class participation?

The class participation will be evaluated based on how actively students participate in classroom discussions. Roughly, if the students are active in discussions, they will get 9~10 points; if they participate in discussions occasionally, 7~8 points. Some points will be deducted if the students are absent from class with no valid reasons.


Project

 

Each team conducts an open-ended investigation on a topic assigned.

a)      Presentation 15%

a.       Presentation organization 5%

b.      Technical description 5%

c.       Easy to understand 5%

b)      Project report 10%

a.       Breadth 5%

b.      Depth 5%

 

        Requirements: In both presentation and report, each team should:

a)   Describe the background of the related topic

b)      Identify major issues (problems, concerns, questions) in the field

c)   Address the identified issues with technical details

d)     Provide your own comments and analyses

e)   Give illustrative examples and case studies where appropriate

f)    List all references

 

The project outline within 5 pages is due in week 9. The presentations are scheduled in weeks 12 and 13. The final report is due on Monday in week 14.

 


Synopsis: This course provides both fundamental principles and technical skills for analyzing, evaluating, and developing secure systems in practice.  Students will learn essentials about security models, algorithms, protocols, and mechanisms in applied cryptograph, computer networks, and access control systems. Classroom instruction will be integrated with hands-on exercises on security tools.

Text book: Security in Computing (4th/3rd edition) by Charles P. Pfleeger and Shari L. Pfleeger, Prentice Hall (2007/2003)


 

Professor

 

 

Teaching Assistants and teaching schedule:  

·         TBD

Office hour:

By appointment