SUNY at Buffalo&nbs p; CSE565 Computer Security
Fall 2017 
 
Prof. Shambhu Upadhyaya 
 
 
CSE 565  

Home   
Course Description   
Instructor &TAs  
Lectures  
Handouts
Homeworks
Labs and Projects  
Student Database   

 
 

Description

Course Organization:

Two 80 minutes lectures per week. Two or more large projects, some homeworks, Quizzes and three midterms. There will be no final exam for this course.

Encryption and Decryption, Network Security, System Security.

Prerequisites: A course on Networks will be a plus. Some programming experience and a course in Algorithms will be helpful.

Course webpage: http://www.cse.buffalo.edu/faculty/shambhu/cse56517/

Lecture Hours and Place: Tuesdays and Thursdays 9:30 am - 10:50 am, 201 NSC


Expanded Description:

This course is intended to give you an in-depth understanding of computer system security. Security has become one of the major concerns in the government, commercial organizations and the home front. The topic Computer Security encompasses malware injection, hacker challenges, malicious break-ins and insider threats. Course topics include: Basic Encryption and Decryption -- Symmetric Ciphers, Public Key Encryption such as Rivest-Shamir-Adelman (RSA) algorithm, El Gamal and Digital Signature Algorithms, Hash Algorithms; Network Security -- Authentication, Email Security, IP Security, Web Security; System Security -- Intrusions, Intrusion Detection, Malicious Software, Covert Channels, Firewalls; Several projects will be set up to reinforce the concepts learned in the class. This may include simulation projects and hands-on projects.


Course Materials:


We will use Seventh Edition of William Stallings' Cryptography and Network Security book. 

  • [STAL]

  • Cryptography and Network Security, Principles and Practices, 7th Edition, Pearson, 2017,
    by William Stallings.
    (required to buy)
     
  • [SIC3e]

  • Security in Computing, 4th Edition, Prentice Hall, 2007,
    by Charles Pfleeger and Shari Lawrence Pfleeger.
    This is a good reference on security.
    (no need to buy)
     
  • [TW]

  • Introduction to Cryptography with Coding Theory, 2nd Edition, Prentice Hall, 2006,
    by Wade Trappe and Lawrence Washington.
    This is a good reference on Cryptography.
    (no need to buy)
     
  • [NETS]

  • Network Security, Private Communication in a Public World,
    by Charlie Kaufman, Radia Perlman and Mike Speciner.
    This is a good reference on Authentication, Kerberos, etc.
    (not required to buy)
     
  • One-page Syllabus for you to print out [pdf]


  • Academic integrity: The value of our courses, grades, degrees and research findings are dependent upon adherence to standards of ethical conduct. Plagiarism and inappropriate collaboration will not be tolerated. In this course we will adhere to the departmental standard for academic integrity, as follows:

    As a good rule of thumb, you may discuss any problem in the course as long as no one is using a writing implement (computers included) nor looking at any source code for the assignment. That is, any group work must be verbal only. Obviously you may look at the textbook or class handouts/class notes together. One exception to this rule is that when a friend is having trouble with a small bug, and you notice a typo or other ``silly little mistake", you may point it out to them. More substantive assistance is definitely not allowed, from any source whatsoever, including tutors or friends not enrolled in the course. The professor or teaching assistants will be able to give more help if you are stuck with concepts.

    All academic work must be your own. Collaboration, usually evidenced by unjustifiable similarity in assignments, is never allowed. Plagiarism, defied as copying or receiving materials from a source or sources and submitting this material as one's own without acknowledging the particular debts to the source (quotations, paraphrases, basic ideas), or otherwise representing the work of another as one's own, is never allowed. After an appropriate informal review, if any students are found in violation of maintaining academic integrity, sanctions will be imposed, which can be as severe as receiving an F in the course. Especially flagrant violations will be considered under formal review proceedings, which can call for harsher sanctions including expulsion from the University. If you ever have any questions or concerns regarding the policy, particularly as it relates to this course, see your instructor.

    Additional information on University-wide policies and procedures is contained in UB Catalog Statement on Academic Integrity.


Last Updated: 10/09/17