CS 4235: Introduction to Information Security
Spring 2010

Class Meetings
Cherry Emerson 320
4:30-6 Tues/Thurs

Textbook: Charles P. Pfleeger and Shari Lawrence Pfleeger. Security in Computing, Fourth Edition. Prentice Hall, 2007. ISBN 0-13-239077-9. In addition to the textbook, we will read publications covering strategies for information security. This blog will contain links to these papers when they will be included in class discussions.

Course Description
This course provides a one-semester, initial overview of information security. It is designed to help undergraduate and graduate students with some computer and programming knowledge understand this important priority in society today. It touches on the issues surrounding private citizens’ concern for privacy, the reasons for continued security failures after decades of attack, the role of people in securing systems, and the impact of negligent practices. Technically, the course examines  solutions that provide security for information processing systems, secure operating systems and applications, network security, cryptography, security protocols, and so on.

Course Objective

This course provides students with a background, foundation, and insight into the subject of information security. This knowledge will serve as basis for future study in selected aspects of this important field or as an important dimension to their effectiveness in the broader computer science field. The primary objectives of the course are:

  1. Literacy in information security problems and issue
  2. Gain ability to understand technical building blocks for security
  3. Acquire background to interact and aid information security staff in both large and small organizations
  4. Develop awareness of individual responsibility in maintaining secure environments
  5. Appreciate consequences (economic, personal, societal) for computer security breaches

As a part of your general education, the course will also help you learn to:

  • Communicate (written and verbally) about a complex, technical topic simply and coherently.
  • Work and interact collaboratively in groups to examine, understand and explain key aspects of information security.

Teaching Philosophy

We will make extensive use of classroom discussions based on the basic text and additional reading that I assign or you discover.We use class projects to reinforce skills or understanding. You will be given many opportunities to express and defend your views regarding the impact of the subject on you, society, a business / organization, or the information system. You will be expected to participate actively in discussions. On any given issue, you may be asked to summarize and critique reading assignments from the text or articles that you have read.

Class Participation and Attendance
Discovery does not arise from instruction but from personal engagement with the controversies and potentials of a computerized society. You have to be in class to contribute to and benefit from that personal engagement. As shown below, a portion of your grade depends on class participation.

In this class, engagement will take several forms:

  • You will be expected to read, summarize, and interpret  readings for yourself and others.
  • You will be expected to study problems, techniques, and approaches individually and in groups, and then present your findings both orally.
  • You will be expected to critique the perspectives/opinions of both authors and classmates in discussions and position papers.

If you are unable to attend class, notify the TA by email before the period begins. If you are absent withouth excuse and called upon to participate, it will count against you in tallying your final grade.

Students with access to laptops may use them in class at their discretion. Audio should be silenced, and you should not be wearing earphones.If  your laptop use is distracting, we may ask you to close it for the rest of class. Please keep in mind that heavy laptop use during lecture may lessen your participation in discussion.

Cell Phones & Handheld Computers
Cell phones are very distracting in lecture. All cell phones should be silenced or powered off for all classes. If you forget and your phone rings, please silence the ringer as soon as possible. If you believe a call is urgent, you may step outside to answer. It is extremely rude to answer a cell phone in class.
All devices must be powered down and put away during any exam or quiz. Any student typing ontheir device or reading information from their device are subject to a zero on the exam. Music Players, iPods and similar products should not be used in class.

General Assignment Guidelines

  • Technical Format: Although the most important thing to do in any assignment is to show that you have thought about the topic and gained some understanding, grading also takes technical format into account All written assignments must be prepared using a word processor. Each assignments page count assumes 12 point font, double-spacing (24 point leading), letter-size paper, and 1″ margins. Feel free to use other software for writing (e.g., LaTeX, Pages, etc). Class presentations should be accompanied by hard copies of all material presented in class.  This can take the form of a PowerPoint file or a .pdf document.  There are no required formats for these materials, although it is expected that all slides be readable as “stan-alone” documents with sufficient explanatory notes to permit a reader to understand what was said in class.
  • Each paper should clearly identify the author(s), date, and assignment number. If the assignment discusses an article, a proper citation for that article (author, title/headline, publication name, date, and page number or URL) must be included in the paper. In addition, at least the first page of the article should be attached (photocopies are acceptable).
  • Writing Style: All assignments are expected to be grammatically correct with accurate spelling. All writing assignments should be proofread and corrected before submission. Incomplete sentences and broken grammar will adversely affect your score. For footnotes and bibliographies, students will use a standard citation style. Students are encouraged to learn and use tools such as EndNote (for Word, available for free from OIT) or BiBTeX (for LaTeX).
  • Late Policy:  Homework and papers are due at the start of class on the due date, unless otherwise specified. Late work will be accepted, but penalized. Work not turned in by a designated final cut-off will not be considered and graded as a “zero” in numerical grading. All assignments must be turned in for a passing grade. Hardship exceptions to this policy will be considered and granted by the TA only before the assignment is due.
  • Academic Honesty: We  recognize and fully support the Georgia Tech Academic Honor Code as presently defined for the Georgia Tech community. A copy of the Honor Code can be found at this Georgia Tech website. All students are expected to maintain traditional standards of academic integrity by giving proper credit for all work referenced, quoted, etc. Unless otherwise stated, all work is individual work by each student. Plagiarizing is defined by Webster’s as “to steal and pass off (the ideas or words of another) as one’s own: use (another’s production) without crediting the source.” Quote and attribute any words that are not your own. If caught plagiarizing, you will be dealt with according to the GT Academic Honor Code. Unless specifically identified as group work, all graded portions of the course are to be completed alone. Any student in violation will receive a zero on the assignment for the first violation, and will fail the course on a second violation. All violations will be reported to the Office of Student Integrity.
  • Grading

Your grade will be based on the following evaluated tasks:
Projects (50%)
Midterm 1 (10%)
Midterm 2 (10%)
Final exam (20%)
Class participation & attendance (10%)
All assignments and projects are required for passing the course. Any assignment turned in by email
that contains a virus will receive an automatic zero.
Grades will be posted at T-Square.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: