Spring 2011
LOV 301
2:00PM - 3:15PM
The goal of this course is to provide students with an understanding of fundamental network security concepts and mechanisms, and develop and illustrate the use of cryptography in achieving network security. The students should gain an understanding of how to design and build secure network algorithms and environments. The students should also gain an understanding of network security as it relates to the TCP/IP protocol suite at a detailed level.
This course will survey network security from a computer science perspective. We will study basic aspects such as network security services and mechanisms, use of cryptography for implementing network security, and security functionality such as authentication, data integrity, confidentiality and availability. We will cover needed aspects of secret key and public key cryptography, as well as public key infrastructure. We will explore various TCP/IP protocols used in the network security context. We will also briefly cover firewalls and intrusion detection systems and possibly other related topics such as secure DNS as time permits.
In addition to the above official prerequisite, it is also helpful to be acquainted with the fundamental concepts, systems, and architectures of computer networks (by taking courses such as undergraduate computer networks class CNT 4504 or graduate computer networks class CNT 5505)and be comfortable with developing programs using high-level programming languages such as C/C++ and Java. There two requirements will be critical to your fully appreciating the materials that will be covered in this course.
There will be five homework assignments (both written and programming), one midterm exam, one final exam, and one group course project. For the group project, each group can have up to 3 students, consisting of either all undergraduate students or all graduate students.
A [90-100] A- [89-90) B+ [88-89) B [81-88) B- [80-81) C+ [79-80) C [71-79) C- [70-71) D [60-70) F <60
Attendance Policy:
The university requires attendance in all classes, and it is also important to your learning. The attendance record may be provided to deans who request it. If your grade is just a little below the cutoff for a higher grade, your attendance will be one of the factors that we consider, in deciding whether to "bump" you up to the higher grade. Missing three or fewer lectures will be considered good attendance. In rare cases, such as medical needs or jury duty, absences may be excused with appropriate documentation. You should let me know in advance, when possible, and submit the documentation I seek. You should make up for any materials missed due to absences.
NOTE: recitation attendance is required. Both announced and unannounced quizzes will be given during recitations.
Missed exam Policy:
A missed exam will be recorded as a grade of zero. We will follow the university rules regarding missed exams for all the exams, including the final exam.
Late Assignment Policy:
In order to enable us to provide timely solutions to assignments, we have the following policy regarding submission of late assignments.
- An assignment that is turned in no more than 24 hours late will be scored with a 10% penalty.
- An assignment that is turned in more than 24 and no less than 48 hours late will be scored with a 20% penalty.
- An assignment that is turned in more than 48 hours late will receive the score of zero, though we will review it and comment on it.
Incomplete Grade (Grade of 'I') Policy:
The grade of 'I' will be assigned only under the following exceptional circumstances:
- The final exam is missed with an accepted excuse for the absence. In this case, the final exam must be made up during the first two weeks of the following semester.
ACADEMIC HONOR POLICY:
The Florida State University Academic Honor Policy outlines the University's expectations for the integrity of students' academic work, the procedures for resolving alleged violations of those expectations, and the rights and responsibilities of students and faculty members throughout the process. Students are responsible for reading the Academic Honor Policy and for living up to their pledge to . . . be honest and truthful and . . . [to] strive for personal and institutional integrity at Florida State University. (Florida State University Academic Honor Policy, found at http://dof.fsu.edu/honorpolicy.htm.)
AMERICANS WITH DISABILITIES ACT (ADA):
Students with disabilities needing academic accommodation should:
(1) register with and provide documentation to the Student Disability Resource Center; and
(2) bring a letter to the instructor indicating the need for accommodation and what type. This should be done during the first week of class.This syllabus and other class materials are available in alternative format upon request.
For more information about services available to FSU students with disabilities, contact the:
Student Disability Resource Center
874 Traditions Way
108 Student Services Building
Florida State University
Tallahassee, FL 32306-4167
(850) 644-9566 (voice)
(850) 644-8504 (TDD)
(850) 644-7164
sdrc@admin.fsu.edu
http://www.disabilitycenter.fsu.edu/Academic Integrity:
Remember that the goal of programming assignments and homework is to enhance your analysis, reasoning, and programming skills. Indulging in academic dishonesty defeats this purpose apart from being unfair to other students. In case you have any questions about whether an act of collaboration may be construed as academic dishonesty, please clarify the issue with the instructor before you collaborate.
All students should follow FSU Academic Honor Code. You might be assigned a grade of 'F', if you are found to have indulged in academic dishonesty.
It is understandable that discussing a problem with other people may lead to more insight into the issues involved. Thus discussing a problem in assignments/homeworks with other people is fine. However, discussing the solutions to the problem is NOT acceptable.
Every student must write his/her own code and homework. Showing your code or homework to members of other teams, giving it to them, or making it accessible to them (e.g., by making the files world-readable) is academic dishonesty.
You are responsible for ensuring that your code/documentation/results are adequately protected and not accessible to other teams. Change permissions of your working directory to 0700 ('chmod 0700 <directory>).
Consulting code/material from a textbook, or from the Internet, in order to understand specific aspects of your assignment is fine. However, copying such code/material will be considered academic dishonesty. If you borrow small parts of code/material from these sources, you must acknowledge this in your submission and additionally you must clearly understand and be able to explain the borrowed code/material.
Plagiarism detection tools, such as Moss (A system for detecting software plagiarism), will be used in this course.
This syllabus is a guide for the course and is subject to change with advance notice.