CS 166 Course Syllabus
- Instructor information
- Name: Mark Stamp
- Office: MQH 216
- Office hours: MW 9:30-11:30am and T 1:00-2:00pm, or by appointment
- Phone: 408-924-5094
- email: stamp@cs.sjsu.edu
- Greensheet: http://www.cs.sjsu.edu/faculty/stamp/CS166/syllabus/syllabusSpr05.html
- Who am I?
- Textbook:
Information Security: Principles and Practice, Mark Stamp.
This is currently only available in manuscript form.
- Contents
- Introduction
- Classic Crypto
- Symmetric Key Crypto
- Public Key Crypto
- Hash Functions and Other Topics
- Advanced Cryptanalysis
- Authentication
- Authorization
- Simple Authentication Protocols
- Real-World Security Protocols
- Software Flaws and Malware
- Insecurity in Software
- Operating Systems and Security
- Appendix
- Other security books:
- Network Security: Private Communication in a
Public World, second edition, Charlie Kaufman,
Radia Perlman and
Mike Speciner, Prentice Hall, 2002, ISBN: 0-13-046019-2.
This book has good coverage
of cryptography and excellent coverage of
various security protocols.
- Security Engineering: A Guide to Building
Dependable Distributed Systems, Ross Anderson, John Wiley
& Sons, Inc., 2001, ISBN: 0-471-38922-6; see
Ross Anderson's Security Engineering website
http://www.cl.cam.ac.uk/~rja14/book.html for lots of interesting security information, and
errata for this book. This is an excellent book, but not
a textbook.
- Security in Computing, third edition,
Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice Hall,
2003, ISBN: 0-13-035548-8. The strength of this book is
its coverage of the security issues related to software.
In particular, operating systems and some aspects
of secure software engineering are covered well. It
also has some reasonably good information on viruses.
- Applied Cryptography: Protocols,
Algorithms and Source Code in C, Second Edition, Bruce Schneier,
John Wiley & Sons, Inc., 1995 (2nd edition), ISBN: 0-471-11709-9.
This is the standard reference for cryptography.
- Computer Security, Dieter Gollmann,
John Wiley & Sons, Inc., 1999, ISBN: 0471978442.
This book is not particularly easy to read. Chapter 8,
How Things Go Wrong, is the best part.
- Computer Security: Art and Science, Matt Bishop,
Addison Wesley, 2003, ISBN: 0-201-44099-7. This is a popular new
(and very long) book. It's extremely theoretical.
- Counter Hack: A Step-by-Step
Guide to Computer Attacks and Effective Defenses,
Ed Skoudis, Prentice Hall, 2001,
ISBN: 0130332739. There are many books that claim to
provide information on how to foil hackers, but this is
the best.
- My PowerPoint slides are available
here
- PowerPoint slides for Alina Vikutan's talk on
Web Insecurity
- Grading:
- Test 1, 100 points. Date: Friday, March 11.
- Test 2, 100 points. Date: Monday, April 11.
- Homework, quizzes, projects, class participation and other work as
assigned, 100 points.
- Final, 100 points.
The official finals schedule is here:
http://info.sjsu.edu/web-dbgen/narr/soc-spring/rec-630.html
- Semester grade will be computed as a weighted
average of the 4 major scores listed above.
- No make-up tests or quizzes will be given and
no late homework or project will be accepted.
- Homework:
- Due Monday, February 21:
Chapter 2, problems 7,9,13,17
- Due Monday, February 21:
Chapter 3, problems 6,15,18,26,29,30,32
(the file Alice.bmp is available here)
- Due Friday, March 4:
Chapter 4, problems 1,2,4,6,8,10,14,18,21 and
compute 744 mod 23 using repeated squaring (show your work)
- Due Friday, March 4:
Chapter 5, problems 3,4,5,9,13,19,25
(files for problem 19 are available here
and the data for problem 25 can be found
here)
- Due Friday, March 25:
Chapter 7, problems 2,10,11,12,16,22
- Due Friday, March 25:
Chapter 8, problems 1,8,10,15
- Due Friday, April 8:
Chapter 9, problems 8,10,11,15,19,22,27
- Due Monday, April 25:
Chapter 10, problems 1,3,5,6,12,14,15,16,19,25
- Due Friday, May 6:
Chapter 11, problems 5,9,17,18 (the exe for problem 17
is avaliable here)
- Due Friday, May 20:
Chapter 12, problems 3,5,7,8,22 (the exe for problem 5
is avaliable here)
Chapter 13, problems 2,3,7,13,21
- Keys to success: Do the homework and
attend class
- Wireless laptop is required
- Cheating will not be tolerated...
- ...but working together is encouraged
- Student must be respectful of the teacher and other students
- Any disability issues must be resolved in advance
- Valid picture ID required at all times
- Major topics to be covered
- Cryptography
- Access Control
- Protocols
- Software
- Special Topics (as time permits)
- Guest lecture
Date: Wednesday, April 6
Time: 3:00 pm
Location: SH 100
- Why study security?