Common Syllabus Revised 01.17.2015



Similar documents
Applied Information Technology Department

IT 101 Introduction to Information Technology

IT 106 Introduction to IT Problem Solving Using Computer Programming revised

IT 415 Information Visualization Spring Semester

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

CS 464/564 Networked Systems Security SYLLABUS

SOC 101 Introduction to Sociology Social & Behavioral Sciences Department

PSY 201 General Psychology Social & Behavioral Sciences Department

AHS 119 Health Careers Allied Health Sciences Department

EDU 230 Schools in Communities Social & Behavioral Sciences Department

How To Be A Responsible Student At Midland Technical College

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

JOHN A. LOGAN COLLEGE M. Rogers SM 14. CIS SECURITY AWARENESS 3 cr. (3-0)

etroy Course Syllabus BUS 3382 XTIA Business Communication Term 1, 2015 August 10 October 11, 2015

CJ 4480 Digital Forensics II Syllabus - Term

etroy Abnormal Psychology 3304 TERM 1, 2015

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Basic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs.

Outline Overview. Course Description

PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus

IT 342 Operating Systems Fundamentals Fall 2014 Syllabus

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

Syllabus Systems Analysis and Design Page 1 of 6

CS3332 Software Engineering I. Term III/2016

University of Colorado Denver College of Engineering and Applied Science CVEN-5333 Surface Water Hydrology

IST 645 Managing Information Technology Projects

CSC 341, section 001 Principles of Operating Systems Spring 2015 Monday/Wednesday 1:00 PM 2:15 PM

TECH 4101 HUMAN RESOURCES FOR ADMINISTRATIVE AND TECHNOLOGY MANAGERS (R1 section) Course Syllabus Fall 2015

IVY TECH COMMUNITY COLLEGE REGION 03 SYLLABUS MATH 136: COLLEGE ALGEBRA SUMMER Instructor: Jack Caster Telephone: ext.

School of Business and Nonprofit Management Course Syllabus

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

CJ 4475 Seminar in Cyber Security Syllabus Term

MGSC 290 Computer Information Systems in Business SYLLABUS Spring 2008

SYST 371 SYSTEMS ENGINEERING MANAGEMENT

IS Management Information Systems

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

The University Of Texas At Austin. The McCombs School of Business

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

4ECE 320 Signals and Systems II Department of Electrical and Computer Engineering George Mason University Fall, 2015

PSYC 414 COGNITIVE PSYCHOLOGY

Dual Enrollment Student Handbook

CIS 160 ST: Web Design and Technology

COURSE NUMBER AND TITLE: Management Information Systems Concepts

Page 1 of 5

Psychological Testing (PSYCH 149) Syllabus

MIS Systems Analysis & Design

MONTGOMERY COLLEGE Rockville Campus CA141 Introduction to Database Applications Computer Applications Department

Other Requirements: USB drive, Internet Access and a campus address.

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

231 Consumer and Market Behavior Section 01 Summer 2015

CEDAR CREST COLLEGE Psychological Assessment, PSY Spring Dr. Diane M. Moyer dmmoyer@cedarcrest.edu Office: Curtis 123

IST659 Fall 2015 M003 Class Syllabus. Data Administration Concepts and Database Management

Describe the unique legal, financial, and regulatory attributes of tax-exempt entities.

ERP 5210 Performance Dashboards, Scorecard, and Data Visualization Course Syllabus Spring 2015

Prerequisite: For students other than business and agribusiness majors.

POLICIES AND PROCEDURES REGARDING TEACHING SCHEDULES, GRADING, AND ADVISING IN THE COLLEGE

George Mason University Electrical and Computer Engineering Department ECE 201: Introduction to Signal Analysis Syllabus Fall 2015

ACCT 3103 Intermediate Accounting I Oklahoma State University Spring 2015

Traditional courses are taught primarily face to face.

San José State University Lucas College of Business School/Department Course, Section, Course Title Semester, Year

CS 450/650 Fundamentals of Integrated Computer Security

Statement of the Kelley School of Business MBA Code of Student Ethics

BUS Computer Concepts and Applications for Business Fall 2012

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

TMGT W Principles of Cost Engineering Course Syllabus: Spring 2013 Online ecollege Course

Mgt 2020Y - Marketing Fall 2013 Wednesday: 6:00 8:50pm, S4037. Wednesdays 9:00-10:00pm or by appointment.

Advanced Software Engineering COSC Department of Computing Sciences Fall 2015

CS4320 Computer and Network Security. Fall 2015 Syllabus

Forensic Biology 3318 Syllabus

CS 261 C and Assembly Language Programming. Course Syllabus

COMP252: Systems Administration and Networking Online SYLLABUS COURSE DESCRIPTION OBJECTIVES

Master of Arts in Psychology

Online Learning Policies & Procedures. La Roche College

9:00am-10:00am Tuesday, Wednesday, 1:40pm-2:40pm (or by appointment)

Systems and Internet Marketing Syllabus Spring 2011 Department of Management, Marketing and International Business

COURSE SYLLABUS CON 598 PROJECT MANAGEMENT METHODOLOGIES I SPRING 2011

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Nashville State Community College Business & Applied Arts Division Business Program. Master Course Syllabus

University of North Texas at Dallas Spring 2014 SYLLABUS

Management 3050 Y Human Resource Management

Troy Online. Department of Kinesiology & Health Promotion KHP 3316 (online) Community Nutrition Course Syllabus. Term 5, Summer 2016 May 23-July 24

MGT 3361 Project Management

CJ 4488, 4489, 4490 Lee Page 1

CISM Fundamentals of Computer Applications

How To Pass A Management Course At Anciento State University

SE 333/433 Software Testing and Quality Assurance

FIN 357 BUSINESS FINANCE

Mission of the Hospitality Management Program: Create, share and apply knowledge to develop leaders for the hospitality industry.

COURSE REQUIREMENTS AND EXPECTATIONS FOR ALL STUDENTS ENROLLED IN COLLEGE ALGEBRA ROWAN UNIVERSITY CAMDEN CAMPUS SPRING 2011

Transcription:

Department of Applied Information Technology Volgenau School of Engineering IT 366 Information Security Fundamentals Common Syllabus Revised 01.17.2015 This syllabus contains information common to all sections of IT 366 for the Spring 2015 semester. Information specific to each section will be made available to registered students via the Blackboard course management system. University Policies The University Catalog is the central resource for university policies affecting student, faculty, and staff conduct in university affairs. Unless explicitly noted, any conflict between the policies in the University Catalog and the content of this document is unintentional. Please notify the author to resolve any such conflicts. Please note that the Academic Year runs from the Fall semester of one calendar year through the Spring and Summer semesters of the following calendar year. Please be sure to select the correct archived Catalog if appropriate. Weather related cancellations In the event of weather related cancellations (eg: snow, ice, earthquakes, tornadoes, etc.) the faculty member will follow all University mandated recommendations for managing the cancellation. In some instances, this may mean rescheduling the class at the end of the semester. Also the faculty member reserves the right to cancel the class and make up the work during the next class meeting. In any case, the faculty member will defer to guidance provided by the Provost, the Dean and or the Volgenau School of Engineering. Scheduled Sections Section Instructor Campus Day Time 001 Prof. Manevich Prince William Tuesdays 7:20 10:00 p.m. DL1 Prof. Winston Online Copyright 2015. Thomas G. Winston. All Rights Res. Page 1 of 12

Course Description IT 366 - Network Security I Credits: 3 Examines information security services and mechanisms in network context. Topics include symmetric and asymmetric cryptography; message authentication codes, hash functions and digital signatures; digital certificates and public key infrastructure; access control including hardware and biometrics; intrusion detection; and securing network-enabled applications including e-mail and web browsing. Prerequisite(s): (IT 206 or CS 211) and IT 223. Prerequisite enforced by registration system. Hours of Lecture or Seminar per week: 3 From http://catalog.gmu.edu/preview_course.php?catoid=25&coid=255065 Prerequisites The prerequisites for this course are (IT 206 or CS 211) and IT 223. Unless a waiver is granted, a grade of "C" or better must be achieved in each prerequisite course before a student is qualified to take this course. The prerequisite courses must be completed prior to, not concurrently with, this course. This requirement will be strictly enforced. Any student who does not meet the prerequisite requirement will be dropped from the course by the Instructor at the start of the semester and the student will be responsible for any consequences of being dropped. Rationale Information security is a critical aspect of information technology unless users can be confident that information is complete, consistent and accurate, it is worthless. A majority of information used today is transmitted over electronic networks, which adds additional security concerns when those networks are not under the direct control of the user (as is typically the case, especially when the Internet is part of the end-to-end network between the user and the information source or destination). This is the first course of three (with IT 466 Network Security II and IT 467 Network Defense) that focus on securing information in a network context. This course emphasizes the fundamental tools and techniques used to provide information security services in that context, using current examples of technologies and their applications. Copyright 2015. Thomas G. Winston. All Rights Res. Page 2 of 12

Course Appilicability This course is an option in the Information Security (INFS), and the Network / Telecommunications (NTEL) concentrations of the AIT major, and an elective in the AIT minor. Completion of this course with a grade of C or better is required for IT 466, and IT 467. Objectives On successful completion of this course, students will be able to: - Describe the information network context, including common approaches to networking. - Describe the risks involved in transmitting information over networks and give examples of threats to and attacks against network security. - Describe the security services needed for information networks. - Describe the operation and give examples of modern network security mechanisms. - Give examples of current applications of network security technologies. Faculty and Staff Course Coordinator: Thomas G. Winston Instructors: Section 001 Julia Manevich Section DL1 Tom Winston Teaching Assistant: To be assigned see Blackboard Administrative support: Cindy Woodfork Prince William campus Bull Run Hall, Suite 102 Email: cwoodfo1@gmu.edu Phone: 703-993-8461 Copyright 2015. Thomas G. Winston. All Rights Res. Page 3 of 12

References Textbooks There is one required textbook for this course: Network Security Essentials: Applications and Standards 5 th edition William Stallings 2014; Prentice Hall Publisher s pricing (as of 8/26/2014): Hardcover $101.80 Electronic $ 40.99 This textbook is available in an electronic format at a significantly lower price than the paperback format. See the publisher s W eb page for more information. Grading Grades will be awarded in accordance with the Mason Grading System for undergraduate students. See the University Catalog, Academic Policies, AP.3.1 Undergraduate Grading for more information. The grading scale for this course is: 97 100% A+ Passing 93 96% A Passing 90 92% A- Passing 87 89% B+ Passing 83 86% B Passing 80 82% B- Passing 77 79% C+ Passing 71 76% C Passing 60 71% D Passing* 0 59% F Failing * Grades of "D" are considered passing grades for undergraduate courses. However, a minimum grade of "C" is required in the AIT major for any course that is a prerequisite for one or more other courses. This course is a prerequisite for several courses in AIT Concentrations see the University Catalog for course descriptions including prerequisite requirements. Raw scores may be adjusted by the instructor to calculate final grades. Copyright 2015. Thomas G. Winston. All Rights Res. Page 4 of 12

Final grades will be based on the following components: In-class exercises 15% Homework 25% Mid-term exam 30% Final exam 30% In-class exercises Exercises (including quizzes and other activities) will be conducted in selected class sessions throughout the semester. Exercises may not be announced in advance. Any student who misses an exercise due to an unexcused absence will receive zero (0) for that exercise. Note: Online sections do not meet in person and will not have in-class exercises. Other coursework will be assigned for those sections to determine this grade component. Homework Homework will be assigned several times during the semester. Each assignment will count towards the final grade - there are no "optional" assignments. Each homework assignment is to be prepared and submitted as specified by the Instructor. Students are expected to submit work as scheduled by the Instructor. Any assignment submitted after the due date-time but within 24 hours of it will be graded with a penalty of 20% of the available credit. Any assignment submitted more than 24 hours late will not be graded. Mid-term exam The mid-term exam will be conducted during the 6 th scheduled class session and will be based on topics addressed in Lectures 1-5. The mid-term exam will be closed book no reference materials other than those provided with the exam paper will be permitted. Mid-term exams will be returned to students once all mid-term exams for all sections have been graded. Students in online sections are required to attend an exam session (to be scheduled) in person, or to arrange for a proctored exam. Final exam The final exam will be held during the scheduled final exam session and will be based on topics addressed throughout the entire course. The final exam will be closed book no reference materials other than those provided with the exam paper will be permitted. Final exams will be retained by the Department of Applied Information Technology and will not be returned to students. Students in online sections are required to attend an exam session (to be scheduled) in person, or to arrange for a proctored exam. Copyright 2015. Thomas G. Winston. All Rights Res. Page 5 of 12

Mid-term and final grades will be posted to PatriotWeb, which is the only mechanism for students to obtain those grades. A student with a "hold" on his/her PatriotWeb account will be unable to access grades until the hold has been removed by the Registrar. Schedule Lecture Content 1 Introductions; Logistics; Course overview Networking and security fundamentals Legal and ethical issues 2 Security policy; Security services Security architecture Number theory for cryptography 3 Symmetric cryptography (including DES, AES, modes of operation) 4 Public key cryptography (including Diffie Hellman, RSA, certificates, PKI) 5 Message authentication (including MACs, digital signatures) Review for mid-term exam 6 Mid-term exam Reading* Preface 1.0, 1.1, 1.7 Chapter 1 Chapter 1, 2.3, Appendix A Chapter 2 3.4-3.7, 4.1, 4.3-4.7 3.1-3.3, 3.6 7 User authentication; Access control Identity management; Kerberos 8 Network layer security IPsec and IPv6 Chapter 4 Chapter 6 9 Web security; SSL and TLS Chapter 5 10 Email security; PGP, S/MIME, DKIM Chapter 7 11 Wireless security Chapter 6 12 Intruders; Intrusion detection Chapters 9, 10 13 Firewalls; Honeypots Chapter 11 14 Network management security; SNMP Review for final exam - Final exam Chapter 12 The reading assignment shown for each lecture is to be completed prior to that lecture. * From the textbook Copyright 2015. Thomas G. Winston. All Rights Res. Page 6 of 12

This schedule is subject to revision before and throughout the course. Registered students should see Blackboard for the latest class schedule. Important Dates Please see the GMU calendar for important dates, including the last days to add and drop courses. Religious Holidays A list of religious holidays is published by University Life. Any student whose religious observance conflicts with a scheduled course activity must contact the Instructor at least 2 weeks in advance of the conflict date in order to make alternative arrangements. Attendance Policy Students should attend as much as possible. After all it is you who pay for the course. However, sickness, work schedules, and work travel make this this impossible. Please notify the instructor of any planned absence for these issues Copyright 2015. Thomas G. Winston. All Rights Res. Page 7 of 12

Classroom conduct Students are expected to conduct themselves in a manner that is conducive to learning, as directed by the Instructor. Any student who negatively impacts the opportunity for other students to learn may be asked to leave the classroom. Electronic devices are potential distractions in the classroom environment. All electronic devices must be turned off or set to "silent" mode at all times unless the Instructors directs otherwise. In order to maximize student engagement the Instructor may prohibit use of such devices. Communications Registered students will be given access to a Blackboard section for this course. Blackboard will used as the primary mechanism (outside of lectures) to disseminate course information, including announcements, lecture slides, homework and other assignments, and scores for homework and exams. Some announcements may be sent via Blackboard to students' Mason email accounts. Communication with the Instructor on issues relating to the individual student only should be conducted using Mason email, via telephone, or in person - not in the public "Discussions" forums on Blackboard. To protect student privacy any communication related in any way to a student's status must be conducted using secure Mason systems if you use email to communicate with the Instructor you MUST send messages from your Mason email account. Students must activate and monitor their Mason email accounts to receive important information from the University, including messages related to this class. Lecture slides are complements to the lecture process, not substitutes for it - access to lecture slides will be provided in Blackboard as a courtesy to students provided acceptable attendance is maintained. Copyright 2015. Thomas G. Winston. All Rights Res. Page 8 of 12

All course materials (lecture slides, assignment specifications, etc) are published on Blackboard in Adobe Portable Document Format (PDF). This allows users of most computing platforms to view and print these files. Microsoft Word (or a compatible word processing application) is required for preparing assignments it is available on computers in the Mason open labs. Privacy Instructors respect and protect the privacy of information related to individual students. As described above, issues relating to an individual student will be discussed via email, telephone or in person. Instructors will not discuss issues relating to an individual student with other students (or anyone without a need to know) without prior permission of the student. Homework, quizzes, mid-term exams and other assessable work will be returned to individual students directly by the Instructor (or by a faculty member, staff member, or Teaching Assistant designated by the Instructor, or via another secure method). Under no circumstances will a student's graded work be returned to another student. Instructors, staff, and Teaching Assistants will take care to protect the privacy of each student's scores and grades. Disability Accommodations The Office of Disability Services (ODS) works with disabled students to arrange for appropriate accommodations to ensure equal access to university services. Any student with a disability of any kind is strongly encouraged to register with ODS as soon as possible and take advantage of the services offered. Accommodations for disabled students must be made in advance ODS cannot assist students retroactively, and at least one week's notice is required for special accommodations related to exams. Any student who needs accommodation should contact the Instructor during the first week of the semester so the sufficient time is allowed to make arrangements. Campus Notifications Students are encouraged to subscribe to the Mason Alert system to receive notifications of campus emergencies, closings, and other situations that could affect class activities. Each classroom has a poster explaining actions to be taken in different types of crisis. Further information on emergency procedures is available at the Campus Emergency Response Team Web site In the event of an emergency, students are encouraged to dial 911. Other Resources Mason provides many useful resources for students. The following resources may be particularly useful: The Writing Center Copyright 2015. Thomas G. Winston. All Rights Res. Page 9 of 12

The Academic Advising Center The University Libraries Counseling and Psychological Services University Career Services See http://www.gmu.edu/resources/students/ for a complete listing of Mason resources for students. Academic Integrity All members of the Mason community are expected to uphold the principles of scholarly ethics. The AIT major bas been designed to achieve several specific outcomes. One of those outcomes is: An understanding of professional, ethical, legal, security, and social issues and responsibilities. Graduating students are bound by the ethical requirements of the professional communities they join. The ethics requirements for some of the communities relevant to AIT graduates are available via the following links: - ACM Code of Ethics and Professional Conduct - IEEE Code of Ethics - EC-Council Code of Ethics On admission to Mason, students agree to comply with the requirements of the Mason Honor Code. The Honor Code will be strictly enforced in this course. Honor Code cases are heard by a panel of students students who meet the requirements are encouraged to nominate themselves to serve on the Honor Committee. Any use of the words or ideas of another person(s), without explicit attribution that clearly identifies the material used and its source in an appropriate manner, is plagiarism and will not be tolerated. The Instructor reserves the right to use manual and/or automated means (including such services as SafeAssign) to detect plagiarism in any work submitted by students for this course, and to direct Teaching Assistants and/or other faculty and/or staff members to do likewise in support of this course. WARNING! Professors at GMU are mandated by University policy to report any instances of honor code violation - this is not up to individual discretion, it is a standard GMU policy to which all of you must adhere by registering for and taking this class. This course has a zero tolerance policy for violations of the Honor Code. There are no second chances. First offenses carry a minimum recommended sanction of: an assignment grade of 0, one letter grade (10%) reduction in the final grade, and a requirement to complete an academic integrity seminar. Second and third offenses (and egregious first offenses, as determined solely by the instructor/course coordinator) carry stiffer minimum recommended sanctions, including but not limited to: F in the course, academic suspension, Copyright 2015. Thomas G. Winston. All Rights Res. Page 10 of 12

and expulsion. Please do not even think about violating the Honor Code. There are many ways to receive help. You are strongly encouraged to use these methods if you are struggling, so that you can get the help you need. If you have any questions about what does/does not constitute an Honor Code violation, please contact your instructor. For this course, the following requirements are specified: Students may work with other current IT 366 students on assignments. However, students are expressly prohibited from: Obtaining assistance, program design, algorithm logic, or code from individuals other than the course s instructor, current IT 366 graduate teaching assistants, or current IT 366 students All work must be newly created by the individual student for this course for the semester in which the student is enrolled. Any usage of work developed for another course, or for this course in a prior semester, is strictly prohibited without prior approval from the instructor. Posting or sharing course content (e.g. instructor provided lecture notes, assignment directions... anything not created solely by the student), using any non-electronic or electronic medium (e.g. web site, FTP site, any location where it is accessible to someone other than the individual student, instructor and/or teaching assistant(s)) constitutes copyright infringement and is strictly prohibited without prior approval from the instructor. Copyright 2015. Thomas G. Winston. All Rights Res. Page 11 of 12

Students may seek assistance with assigned work (and are encouraged to do so if they feel the need), provided: The directions for the assigned work do not prohibit such assistance. Such assistance is explicitly acknowledged in the submitted work, clearly identifying the person(s) giving assistance and the nature of the assistance given. Any work to be submitted is prepared entirely and exclusively by the student submitting it. Students are expressly prohibited from sharing any assessable work for this course in any manner with other students (except students assigned as Teaching Assistants or Undergraduate Peer Mentors to this course and the student's section), unless all students involved have had their work graded and returned by the Instructor, or the Instructor has explicitly approved such sharing. Another aspect of academic integrity is the free exchange of ideas. Vigorous discussion and debate are encouraged in this course, with the firm expectation that all aspects of the class will be conducted with civility and respect for differing ideas, perspectives, and traditions. Please see the Mason Diversity Statement for more information on this topic. Students are encouraged to ask for clarification of any issues related to academic integrity and to seek guidance from the Instructor, other faculty members, academic advisors, or the Office for Academic Integrity. Copyright 2015. Thomas G. Winston. All Rights Res. Page 12 of 12