GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet

advertisement
KENNESAW STATE UNIVERSITY
GRADUATE COURSE PROPOSAL OR REVISION,
Cover Sheet (10/02/2002)
Course Number/Program Name CS 6040 Computing Security/ MS-CS
Department Computer Science
Degree Title (if applicable) M.S. Computer Science
Proposed Effective Date Fall 2012
Check one or more of the following and complete the appropriate sections:
X New Course Proposal
Course Title Change
Course Number Change
Course Credit Change
Course Prerequisite Change
Course Description Change
Sections to be Completed
II, III, IV, V, VII
I, II, III
I, II, III
I, II, III
I, II, III
I, II, III
Notes:
If proposed changes to an existing course are substantial (credit hours, title, and description), a new course with a
new number should be proposed.
A new Course Proposal (Sections II, III, IV, V, VII) is required for each new course proposed as part of a new
program. Current catalog information (Section I) is required for each existing course incorporated into the
program.
Minor changes to a course can use the simplified E-Z Course Change Form.
Submitted by:
Approved
Ben Setzer
Faculty Member
9/30/2011_
Date
Not Approved
Department Curriculum Committee Date
Approved
Approved
Approved
Approved
Approved
Approved
Not Approved
Department Chair
Date
School Curriculum Committee
Date
School Dean
Date
GPCC Chair
Date
Dean, Graduate College
Date
Not Approved
Not Approved
Not Approved
Not Approved
Not Approved
Vice President for Academic Affairs Date
Approved
Not Approved
President
Date
KENNESAW STATE UNIVERSITY
GRADUATE COURSE/CONCENTRATION/PROGRAM CHANGE
I.
Current Information (Fill in for changes)
Page Number in Current Catalog
Course Prefix and Number
Course Title
Credit Hours
Prerequisites
Description (or Current Degree Requirements)
II.
Proposed Information (Fill in for changes and new courses)
Course Prefix and Number _CS 6040_______________________________
Course Title __________ Computing Security
________
Credit Hours 3-0-3
Prerequisites Program Admission
Description (or Proposed Degree Requirements)
This course covers concepts and practices in computer and network security. This
includes topics such as cryptography, authentication, authorization, secure
protocols and principles for developing secure software. Applications will
include using security frameworks to develop software and configuring security
support systems.
III.
Justification
This course is part of the electives of the new MS-Computer Science program.
This course focuses on concepts relating to computer security and developing secure
software. It builds on the understanding of Agile Software Design methods in
adding protocols and principles for developing secure software.
This course contributes to the following Program Objectives:
P.L.O. 1: Building on their undergraduate education in computing, students will master
advanced concepts across a targeted breadth of computer science study.
PLO: 6 Demonstrate the ability to deliver a complete development project, meeting
the standards and requirements.
IV.
Additional Information (for New Courses only)
Instructor: Ben Setzer
Text: Matt Bishop, Computer Security
Prerequisites:
Program Admission
Objectives:
After completing this course
1. The student will be able to explain how the basic concepts of computer
security apply to different components of computing systems
2. The student will be able to apply basic cryptographic techniques using
existing software and in programs she writes
3. The student will be able to explain important protocols and where they would
be applied.
4. The student will be able to explain important classes of malware and apply
standard defensive measures.
5. The student will be able to explain how to apply standard responses in the
case that malware is present
6. The student will be able to configure and use a network based authorization
framework
Instructional Method
Lecture and projects
Method of Evaluation
Projects and in-class tests
V.
Resources and Funding Required (New Courses only)
Resource
Amount
Faculty
Other Personnel
Equipment
Supplies
Travel
New Books
New Journals
Other (Specify)
$0
$0
$0
$0
$0
$0
$0
TOTAL
$0
Funding Required Beyond
Normal Departmental Growth
$0
VI. COURSE MASTER FORM
This form will be completed by the requesting department and will be sent to the Office of the
Registrar once the course has been approved by the Office of the President.
The form is required for all new courses.
DISCIPLINE
COURSE NUMBER
COURSE TITLE FOR LABEL
(Note: Limit 16 spaces)
CLASS-LAB-CREDIT HOURS
Approval, Effective Term
Grades Allowed (Regular or S/U)
If course used to satisfy CPC, what areas?
Learning Support Programs courses which are
required as prerequisites
CS
6040
Comp Sec
3-0-3
Fall 2012
Regular
APPROVED:
________________________________________________
Vice President for Academic Affairs or Designee __
VII MS-CS Course Syllabus Template
CS 6040 Computer Security Syllabus
3 Class Hours, 0 Laboratory Hours, 3 Credit Hours
Course Description: This course covers concepts and practices in computer and
network security. This includes topics such as cryptography, authentication,
authorization, secure protocols and principles for developing secure software.
Applications will include using security frameworks to develop software and
configuring security support systems.
Instructor: Ben Setzer, CL 3043, bsetzer@kennesaw.edu, 770-423-6355
Learning Objectives:
After completing this course:
 The student will be able to explain how the basic concepts of computer
security apply to different components of computing systems
 The student will be able to apply basic cryptographic techniques using
existing software and in programs she writes
 The student will be able to explain important protocols and where they
would be applied.
 The student will be able to explain important classes of malware and apply
standard defensive measures.
 The student will be able to explain how to apply standard responses in the
case that malware is present
 The student will be able to configure and use a network based
authorization framework
Textbook:
Computer Security: by Matt Bishop, Addison Wesley Professional:
ISBN-10: 0-201-44099-7
Instructional Methods and Attendance Policy: Courses will meet for lecture, with lectures
recorded and available for viewing as recordings (asynchronous). Lectures will include
demonstrations. .
Course Requirements and Assignments: . The course will meet for traditional lecture.
Students will be expected to meet for lecture, take all exams and quizzes and complete and turn in
homework assignments for grading.
Evaluation and Grading:
Evaluation will be through exams, quizzes, grading of lab reports, and attendance at lab sessions.
Evaluation will consist of:
Midterm Exam:
30%
Final Exam:
30%
Game Projects and Presentations:
40%
100%
Grading Scale:
90%+
A
80-89
B
70-79
C
60-69
D
< 60
F
Academic Honesty: Every KSU student is responsible for upholding the provisions of the Student
Code of Conduct, as published in the Undergraduate and Graduate Catalogs. Section II of the
Student Code of Conduct addresses the University's policy on academic honesty, including
provisions regarding plagiarism and cheating, unauthorized access to University materials,
misrepresentation/falsification of University records or academic work, malicious removal, retention,
or destruction of library materials, malicious/intentional misuse of computer facilities and/or
services, and misuse of student identification cards. Incidents of alleged academic misconduct will
be handled through the established procedures of the University Judiciary Program, which includes
either an "informal" resolution by a faculty member, resulting in a grade adjustment, or a formal
hearing procedure, which may subject a student to the Code of Conduct's minimum one semester
suspension requirement.
Students are encouraged to study together and to work together on lab assignments as per the
instructor’s specifications for each assignment; however, the provisions of the STUDENT
CONDUCT REGULATIONS, II. Academic Honesty, KSC Undergraduate Catalog will be strictly
enforced in this class.
Disability policy. Kennesaw State University provides program accessibility and reasonable
accommodations for persons identified as disabled under Section 504 of the Rehabilitation Act of
1973 or the Americans with Disabilities Act of 1990. A number of services are available to help
disabled students with their academic work. In order to make arrangements for special services,
students must visit the Office of Disabled Student Support Services (770-423-6443) and arrange
an individual assistance plan. In some cases, certification of disability is required. It is the
student’s responsibility to take care of this at the beginning of the semester.
Schedule and Topic Coverage:
Week
1
2
3
4
5
6
Lecture Topic
8
9
10
11
12
13
14
15
Introduction to security concepts
Access control techniques and concepts
Security and Confidentiality policies
Integrity and Hybrid policies
Cryptography
Cryptography concepts and application
Authentication
Midterm exam
Identity
Access control
Information flow and confinement
Assurance
Evaluating systems
Malicious logic
System and user security
Program security
16
Final Exam
7
Projects
TBD
Reference
Chapter 1
Chapters 2 and 3
Chapters 4 and 5
Chapters 6 and 7
Chapters 8 and 9
Chapters 9 and 10
Chapters 11 and 12
Chapter 13
Chapter 14
Chapters 15 and 16
Chapter 17
Chapter 18
Chapter 19
Chapters 24 and 25
Chapter 26
As per Semester
Schedule
Download