CS329E: Spring, 2013
Elements of Security

Instructor: Dr. Bill Young; Unique number: 51811
Class time: MWF 1-2pm; Location: BUR 136
Office:GDC 7.810; Office Hours: MWF 10-noon and by appt.
Office Phone: 471-9782; Email: byoung at cs.utexas.edu
TA: Joyce Whang; Email: joyce at cs.utexas.edu;
TA Hours and location:TBD
This website: www.cs.utexas.edu/users/byoung/cs329e/syllabus329e.html




Important Class Announcements:

Breaking news important to the class will be posted here. Consult this spot often.

Important note: This class will not have a writing flag. If you must have a writing flag, this is not the class for you.

Feel free to email me (Send me an email message), but please put "CS329E" in the header. I'm teaching another class this semester and this helps me to understand the context of your question or comment.



UTCS Elements Program:

Regardless of their field of study, college students live in a digital information age. The Elements of Computing Program is a set of courses intended to help students understand the sophisticated technologies they use everyday as well as gain the computer skills that employers value. Elements courses are intellectually stimulating and personally rewarding, and they can supplement any undergraduate program.

Course Description:

CS329E is an introduction to topics in computer security, one of the "hottest" and most relevant areas of computing today. The student will develop an intuition about what computer security means, both in the abstract and in the context of real systems; be able to recognize potential threats to confidentiality, integrity and availability; be aware of some of the underlying formalisms and technologies that attempt to address these challenges; and be conversant with current security-related issues in the field.

Topics to be covered may include:

  1. Scope of the security problem;
  2. Various views of computer security;
  3. Security policies;
  4. Formalizing security properties;
  5. Elementary information theory;
  6. Elementary cryptography;
  7. Cryptographic protocols;
  8. Authentication;
  9. Risk assessment;
  10. Malicious logic;
  11. System evaluation and certification.

Prerequisites:

You are expected to have one of the programming classes, but there will be little to no programming in this class. If you don't have the appropriate prerequisite, be sure to clear it with the CS department.

Required text:

Introduction to Computer Security, by Goodrich and Tamassia, 2011.

Class Notes:

Handouts of all class slides will be made available over the course of the semester via links below. Slides are available in PDF format, and can be viewed with Acroread. I've also supplied the slides as 4-up PDFs. If you plan to print them, I suggest printing the 4-ups to save paper.

Slide set 0: It's a Dangerous (Cyber) World PDF, PDF 4-ups.

Assignments:

There will be readings in the textbook. There will also be assignments over the course of the semester. Each student must work on assignments individually unless the assigment explictly allows collaboration.

Links to the assignments will appear below. Check this page often and be sure to check that any particular assignment or due date has not been changed.

Information will be provided on how to submit assignments. Concerns about your assignment grades should be addressed first with the TA, and only with Dr. Young if you can't obtain satisfaction there.

Assignments will be graded on a 10 point scale with 1 point deducted for each day the assignment is late (up to 2 days). After 2 days, the assignment won't be accepted. The number of days late is purely a function of the timestamp recorded when you submit the assignment.

Weekly Assignment: Students will submit on Monday of each week a current article relating to cyber security; the article may come from newspapers, magazines, or electronic media but must be no more than two weeks old at the time of submission. Submit a hardcopy of the article along with a short (typed) synopsis of the contents, its relevance to the class, and at least two discussion questions relating to the article. Follow the format of the sample below. These should be printed and stapled together with your synopsis on top. For example, the following are a sample article and synopsis: the article, the writeup. Your first article is due Monday, January 26, and then each Monday thereafter.

Quizzes:

Short in-class quizzes may be given at any time. These will cover material covered in previous classes. The goal of quizzes is to test your understanding of the material and to give you an idea of the types of questions that will appear on exams. There will be no makeups for quizzes you miss, but any single quiz is only a small proportion of your final grade.

Tests:

There will be two major tests during the semester. The first will be (tentatively) March 11; the second will be given May 6. Both will be given during the regular class period. There will be no final exam during the regular exam time. Tests are closed-book, closed-notes tests, except that you may bring a single handwritten sheet (8 1/2 by 11 inches) of notes (both sides). Your best study strategy is to review the class notes and readings to ensure that you understand thoroughly the topics we covered in class.

No laptops:

Students are asked not to have their laptops or other electronic devices open during class. Copies of all slides will be provided. Please just listen and absorb the material.

Grading policies:

Class attendance is encouraged and will be checked on a majority of class days. Excessive unexcused absences will result in a reduced grade. If you don't plan to come to class regularly, please don't register for this class. Signing in for another student not present will be considered cheating by both students.

Grades are averaged using the weighting below:

Description Percent
Attendance, Quizzes and Participation 10%
Assignments 30%
Midterm Test 30%
Final Test 30%

Course grades are assigned on the scale: A = 90-100; B = 80-90; etc., except that I reserve the right to be more generous than this indicates. That is, I may (and usually do) enlarge the range for any grades. I will never shrink them. I typically do not use the plus/minus grading scale.

Using Piazza:

This semester we will be using Piazza for class discussion. The system is highly catered to getting you help fast and efficiently from classmates, the TAs, and myself. Rather than emailing questions to the teaching staff, I encourage you to post your questions on Piazza. If you have any problems or feedback for the developers, email team@piazza.com. Our class page will be set up shortly and announced here.

Scholastic Dishonesty:

Academic dishonesty will not be tolerated. See www.cs.utexas.edu/users/ear/CodeOfConduct.html for an excellent summary of expectations of a student in a CS class.

No deviation from the standards of scholastic honesty or professional integrity will be tolerated. Scholastic dishonesty is a serious violation of UT policy; and will likely result in an automatic F in the course and may result in further penalties imposed by the department or by the university. Don't do it. If you are caught, you will regret it. And if you're not caught, you're still a cheater.

Some Interesting Links:

Vulnerabilities Persist
Cyberwarriors Needed
Cyberattacks and Jobs
Great time to start a cybersecurity career
CS Enrollments Rocket
Panetta on Cyber Risk
Military Networks Not Hardened Enough
Attacks on Electric Grid
IETF and security
Detecting Counterfeit Electronics
NSA Strategy for Cyberattacks
Cyberwar on Syria?
New Vulnerability in Apple Machines
That's Just Creepy
US Cyber Target List
Cyberwar on Business
New White House Security Plan and The Plan Itself
Facebook Flaw
Iran's Leader Urges Learning Cyberwar Skills
Cyberwar Hyped?
Cyber Combat: Act of War
Snowden vs. the NSA
New in online Education
Crowd sourcing limits
Better Password Encryption
Measuring Redundancy in Encoding
An Internet Minute
Internet vs. Sex
Moshers and Emergent Behavior
Facebook making us lonely
Social media statistics
The anternet
Education about the Internet
Value of the Internet
Flaw in symmetric encryption
Digital Sound Quality
CS Hot Major
Analog and Digital
Could the Internet be Destroyed
Color Scheme
Return to top