IST 451:
Network Security (tentative)
|
||
Instructor Information
|
Name |
Sencun Zhu |
Email |
szhu(AT)cse.psu.edu |
|
Telephone |
814-865-0995 |
|
Office |
IST 338F |
|
Office Hours |
(T) 2:30-4:30pm |
|
|
|
|
TA and LA Information |
Name |
(TA) Yufei
Jiang, (LA) Liz Learn |
Email |
yzj107@ist.psu.edu |
|
Office Hours |
Tuesday
4-5pm, IST 321D |
|
Meeting
Times/Locations |
Class: T, R,
11:15am - 12:30pm / IST 206. |
|
Course Webpage |
||
Prerequisite: |
IST 220,SRA 221 |
|
Course materials: |
Textbook: |
-- William Stallings, Lawrie Brown, Computer
Security: Principles and Practice, 2e Prentice Hall, |
References: |
-- Slides and papers |
Overview |
IST 451 focuses on network and
information security. Students will learn fundamentals of computer security, formal
models of security, aspects of information systems security such as access
control, hacks/attacks, systems and programs security, intrusion detection,
cryptography, networks and distributed systems security, worms, and viruses,
and other Internet secure applications. Students will develop the skills
necessary to formulate and address the security needs of enterprise and
personal environments. |
A detailed list of a lecture by
lecture contents, assignments, and due dates (subject to change as semester
evolves) is available on the course schedule. |
Course Objective |
Upon
completion of the course, the students will be able to: |
|
Grading (subject to change) |
The
course will be graded on exams, a course project, and class participation in
the following proportions: |
A: 92 above, A-: 88-92, B+: 84-87, B: 80-83, B-: 75-79, C+: 70-74, C: 65-69 D: 60-64 F: below 60 |
Exams and Assignments |
|
Ethics Statement |
This
course includes topics involving personal and public privacy and security. We
will cover technologies whose abuse may infringe on the rights of others.
Especially, the hands-on labs may contain practical techniques for launching
security attacks, although we will practice them in our isolated lab. Note
that our purpose is to know the attacks and defend against them. Any abuse of
such technology is at your own risk and responsibility. As an instructor, I
rely on the ethical use of these technologies. Unethical use may include
circumvention of existing security or privacy measurements for any purpose,
or the dissemination, promotion, or exploitation of vulnerabilities of these
services. Exceptions to these guidelines may occur in the process of
reporting vulnerabilities through public and authoritative channels. Any
activity outside the letter or spirit of these guidelines will be reported to
the proper authorities and may result in dismissal from the class. |
AMERICANS WITH
DISABILITIES ACT: |
IST
welcomes persons with disabilities to all of its classes, programs, and events.
If you need accommodations, or have questions about access to buildings where
IST activities are held, please contact us in advance of your participation
or visit. If you need assistance during a class, program, or event, please
contact the member of our staff or faculty in charge. Access to IST courses
should be arranged by contacting the Office of
Human Resources, 332 Information Sciences and Technology Building, (814)
865-8949. |