Download presentation
Presentation is loading. Please wait.
Published byAvis Smith Modified over 8 years ago
1
CIS 3360: Security in Computing Cliff Zou Spring 2012
2
2 Course Information Course lecture time Video recorded at MoWe 2pm – 3:15pm Video released on UCF Tegrity server MoWe 5pm Teacher: Cliff Zou (Associate Professor) Office: HEC243 407-823-5015 Email: czou@eecs.ucf.educzou@eecs.ucf.edu Office hour: MoWe 9am – 11am Course Webpage: http://www.cs.ucf.edu/~czou/CIS3360/index.html http://www.cs.ucf.edu/~czou/CIS3360/index.html Syllabus is on the course webpage and WebCourse UCF Tegrity for online lecture video streaming WebCourse has a Tegrity link Or you can directly login to Tegrity at: https://tegrity.ucf.edu/TegrityUtils/Login.aspx
3
Course Information Use Webcourse@UCF for homework assignment and grading Keep grade private Homework submission Also have a simple BBS channel for Q&A and discussion among students I will read the BBS twice a week to answer any course related questions You can also directly email me for questions Homework solutions will be posted on WebCourse after their due date 3
4
Course in Degree Requirement Required course for CS majors Required course for IT majors Required core course for Multi- Disciplinary Minor in Secure Computing and Networks (SCAN) http://www.cs.ucf.edu/it/SCANminor.html It has a face-to-face session as well (taught by another faculty) 4
5
5 Objectives The student will be able to Explain what security in networked computing systems means. Perform base conversions and arithmetic operations in computer number systems. Describe at a high level the vulnerabilities and threats in the Internet and networked computing systems. Encrypt, decrypt and transmit messages using cryptographic techniques. Apply methods to detect, prevent and repair attacks in networked computing systems. Determine when cyber activities are illegal and criminal. Also, identify the laws and codes of ethics governing the protection of information through copyrights, patents, trade secrets, and trademarks
6
6 Course Materials Textbook: Introduction to Computer Security. M. Goodrich and R. Tamassia, Addison Wesley, 2011. Reference books: J. Kurose and K. Ross, Computer Networking – A Top-Down Approach, Fifth Edition, Addison-Wesley, 2010. C. Pfleeger and S. Pfleeger, Security in Computing, Fourth Edition, Prentice Hall, Inc., 2007. Peter Szor, The Art of Computer Virus Research and Defense, Symantec Press, Addison-Wesley, 2005. M. Quinn, Ethics for the Information Age, Third Edition, Addison-Wesley, 2009. Other references that we can find online
7
7 Grading Policy Coursework times approx % Written homework 4 30% Programming projects 2 25% Midterm exam 2 25% Final exam 1 20% Grading will use +/-, i.e., A, A-, B+, B, B-,…. Will use relative ranking among the whole class for final GPA grade.
8
8 Exam Format Since it is a fully online course, we cannot do written exam on campus Exams can be treated as special homework assignments Exam is released on WebCourse as an assignment Exam is due 24 hours after its release You cannot discuss with another student for solving exam You can do it for normal homework assignments
9
Academic Honesty Plagiarism and Cheating of any kind on an examination, quiz, or assignment will result at least in an "F" for that assignment (and may, depending on the severity of the case, lead to an "F" for the entire course) and may be subject to appropriate referral to the Office of Student Conduct for further action. See the UCF Golden Rule for further information. The Golden Rule http://goldenrule.sdes.ucf.edu/http://goldenrule.sdes.ucf.edu/ 9
10
10 Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.