You will gain exposure to burgeoning areas of information security and learn how to use the tools commonly used for information security today.
The required textbook for the course is: Security in Computing, which is available at Amazon, among other places.
Additionally, you will be expected to read about one paper a week, on average. (Reading List).
Students are expected to abide by the Georgia Tech Honor Code. Honest and ethical behavior is expected at all times. All incidents of suspected dishonesty will be reported to and handled by the office of student affairs. You are to do all assignments yourself, unless explicitly told otherwise. You may discuss the assignments with your classmates, but you may not copy any solution (or part of a solution) from a classmate.
Some familiarity with both network programming, programming in C, and scripting languages (e.g., Perl, Ruby) will be helpful.
Grading will be based on three problem sets, two quizzes, and a semester-long project with a presentation and writeup. Participation will count for "fudge factors".
Papers will not be handed out in class. Please print the readings
and read them before class.
Please note that this schedule is tentative and subject to change throughout the course of the term.
Lecture | Date | Topics | Notes/Resources | Preparation |
---|---|---|---|---|
Introduction and Overview | ||||
1 | Tue 08/23 | Security in Computing |
1.1-1.3 Ware, Checkoway | |
2 | Thu 08/25 | Attacks and Defenses |
Al Qaeda | 1.4-1.5; 1.9-1.10 Denning |
Software Security | ||||
3 | Tue 08/30 | Software Flaws and Vulnerabilities |
Stack Smashing | 3-3.2 Thompson |
4 | Thu 09/01 | Worms and Viruses |
3.3 | |
5 | Tue 09/06 | Malicious Code |
3.4-3.5 | |
Network Security | ||||
6 | Thu 09/08 | Spam and Phishing |
Karger | |
7 | Tue 09/13 | Botnets |
||
Case Study Presentations | ||||
8 | Thu 09/15 | Groups: Censorship, Spam |
||
Tue 09/20 | No Class |
Problem Set 1 Due | ||
9 | Thu 09/22 | Groups: Mobile, Neutrality, Web |
||
10 | Tue 09/27 | Groups: Cellular, DNS, Smart Grid |
||
11 | Thu 09/29 | Groups: Blackhat SEO, Social |
||
Network Security | ||||
12 | Tue 10/04 | Network Security and Threats |
7.1-7.2 | |
13 | Thu 10/06 | Network Defense |
7.3 | |
Tue 10/11 | Quiz 1 |
|||
14 | Thu 10/13 | Firewalls and Intrusion Detection |
7.4-7.5 | |
Tue 10/18 | Fall Recess |
|||
15 | Thu 10/20 | MITM, Public Key Infrastructures |
4.1-4.2 | |
Secure Systems | ||||
16 | Tue 10/25 | Memory Protection and Access Control |
4.3-4.6 | |
17 | Thu 10/27 | Secure Operating Systems |
5.1-5.6 | |
18 | Tue 11/01 | Web Security |
||
Privacy and Anonymity | ||||
19 | Thu 11/03 | Privacy |
||
20 | Tue 11/08 | Anonymity |
||
21 | Thu 11/10 | Censorship |
||
Cryptography | ||||
22 | Tue 11/15 | Elementary/Symmetric Key Crypto |
2.1-2.4 | |
23 | Thu 11/17 | Modern/Public Key Crypto |
2.5-2.8 | |
24 | Tue 11/22 | Cryptographic Hashes |
||
Thu 11/24 | Thanksgiving |
|||
25 | Tue 11/29 | Network Security/Quiz Review |
||
Thu 12/01 | Quiz 2 |
|||
Tue 12/06 | Project Presentations |
|||
Thu 12/08 | Project Presentations |