This course introduces the principles and practice of computer security. It aims to teach you how to model threats to computer systems and how to think like an attacker and a defender. It presents standard cryptographic functions and protocols and gives an overview of threats and defenses for software, host systems, networks, and the Web. It also touches on some of the legal, policy, and ethical issues surrounding computer security in areas such as privacy, surveillance, and the disclosure of security vulnerabilities. The goal of this course is to provide a foundation for further study in computer security and to help you better understand how to design, build, and use computer systems more securely. See the schedule for details.
We've decided not to use an automated late chip server. Instead, to use some of your late days, post a private message on Piazza to the 'late_chips' folder with your name, CNetID, the assignment, and the number of late chips you are requesting. You must request late chips for an assignment before you hand it in.
Remember, with the exception of extraordinary circumstances, assignments submitted late without using late chips will receive no credit.
For this quarter, the Security and Systems seminars have been combined. The next meeting will be tomorrow, Tuesday, October 7 12–1pm in Searle 240b.
Kevin Fu will be attending, and so we'll be reading a paper from his research group: Rushanan et al. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks. IEEE Symposium on Security and Privacy. 2014. There will be Pizza.
If you're interested, we encourage you to sign up for the mailing list.
Prerequisites | CMSC 15400 |
Lectures | Mon., Wed., Fri. 10:30–11:20am, Ry 276 |
Communication |
We'll use Piazza for general discussion and questions about course material. Assignments will be distributed here and be collected via Phoenixforge (instructions here). |
Reference Books |
No textbook is required, but if you would like additional references, we recommend: Security Engineering by Ross Anderson Cryptography Engineering by Ferguson, Schneier, and Kohno |
Undergraduates (CMSC 23200) | Graduate students (CMSC 33250) | |
---|---|---|
Homeworks | 30% | 20% |
Projects | 45% | 45% |
Paper Responses | N/A | 10% |
Class Participation | 5% | 5% |
Final Exam | 20% | 20% |