CSC 607 Course Outline Jan 10 v2

CSC 607 Course Outline Jan 10 v2 - Combined class CSC 607...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Combined class: CSC 607, January 2010 Security in Computing AND WCM 605, January 2010 Dr. Ronald P. Uhlig Wireless Systems Security Phone: 858-309-3415 On-Site Class-Kearny Building Email: [email protected] Room 220, 3678 Aero Court, San Diego, CA 92123-1788 Tue/Thu 5:30 – 10 pm + Sat Jan 23, 8:30am – 1:00 pm Course Outline: CSC 607 – Security in Computing WCM 605 - Wireless Systems Security Textbooks: Charles P. Pfleeger. & Shari Lawrence Pfleeger (2007) Security in Computing , 4 th Edition NJ: Prentice Hall. ISBN# 0-13-239077-9. Praphul Chandra (2005) , Bulletproof Wireless Security, GSM, UMTS, 802.11 and Ad Hoc Security , ISBN 0-7506-7746-5 (available as an e- Book from Spectrum Library through NetLibrary) Course Prerequisite for CSC 607: none Course Prerequisite for WCM 605: WCM 602 Course Description from catalog - CSC 607: This course examines the use of security vulnerabilities and threats in computer programs, operating systems, networks, and databases. The use of cryptography and other countermeasures to provide confidentiality, integrity, and availability is then evaluated in depth, from the perspectives of both technical effectiveness and ethics of users and developers. Course Description from catalog - WCM 605: Security and privacy issues in wireless voice and data. Ensuring confidentiality, integrity, availability and non-repudiability. Identification, authentication and encryption protocols. Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Public Key Infrastructure (PKI). Secure distribution of encryption keys. Use of WPA in Wireless LANs. Ethical issues in wireless communications. Learning Outcomes: Upon successful completion of this course, students will be able to: A. Evaluate and contrast computing security issues. B. Assess computing security vulnerabilities and threats, and effective countermeasures to address them C. Assess and apply alternative countermeasures and controls, including ethics, and combine the best to provide state-of-the-art security in programs, operating systems, databases, and networks. Course Requirements: Students are expected to attend all class sessions, participate in all class activities, complete quizzes and exams as scheduled, and turn in all assignments and make project presentations on time. Failure to do so is likely to result in the loss of points in calculating the grade for the
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
course. In the case of onsite courses, an absence is assessed each time a student is not in attendance during a regularly scheduled class period, whether or not it is an excused absence. Students who have more than three absences, excused or unexcused, cannot be given a satisfactory grade. Course Grading Summary: Item Max One Quiz 10 Mid Term Exam 20 Final Exam 20 Two written assignments worth a maximum of 5 points each 10 Two Small Group Projects (max 7.5 pts each) 15 “Breaking WEP” Class Project (Week 3- 4) 15 Participation and In-class Exercises* 10 Total Points 100 *
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/29/2011 for the course CSC 607 taught by Professor Dr.pradipp.dey during the Spring '11 term at National.

Page1 / 9

CSC 607 Course Outline Jan 10 v2 - Combined class CSC 607...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online