KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002) Course Number/Program Name CS 6040 Computing Security/ MS-CS Department Computer Science Degree Title (if applicable) M.S. Computer Science Proposed Effective Date Fall 2012 Check one or more of the following and complete the appropriate sections: X New Course Proposal Course Title Change Course Number Change Course Credit Change Course Prerequisite Change Course Description Change Sections to be Completed II, III, IV, V, VII I, II, III I, II, III I, II, III I, II, III I, II, III Notes: If proposed changes to an existing course are substantial (credit hours, title, and description), a new course with a new number should be proposed. A new Course Proposal (Sections II, III, IV, V, VII) is required for each new course proposed as part of a new program. Current catalog information (Section I) is required for each existing course incorporated into the program. Minor changes to a course can use the simplified E-Z Course Change Form. Submitted by: Approved Ben Setzer Faculty Member 9/30/2011_ Date Not Approved Department Curriculum Committee Date Approved Approved Approved Approved Approved Approved Not Approved Department Chair Date School Curriculum Committee Date School Dean Date GPCC Chair Date Dean, Graduate College Date Not Approved Not Approved Not Approved Not Approved Not Approved Vice President for Academic Affairs Date Approved Not Approved President Date KENNESAW STATE UNIVERSITY GRADUATE COURSE/CONCENTRATION/PROGRAM CHANGE I. Current Information (Fill in for changes) Page Number in Current Catalog Course Prefix and Number Course Title Credit Hours Prerequisites Description (or Current Degree Requirements) II. Proposed Information (Fill in for changes and new courses) Course Prefix and Number _CS 6040_______________________________ Course Title __________ Computing Security ________ Credit Hours 3-0-3 Prerequisites Program Admission Description (or Proposed Degree Requirements) This course covers concepts and practices in computer and network security. This includes topics such as cryptography, authentication, authorization, secure protocols and principles for developing secure software. Applications will include using security frameworks to develop software and configuring security support systems. III. Justification This course is part of the electives of the new MS-Computer Science program. This course focuses on concepts relating to computer security and developing secure software. It builds on the understanding of Agile Software Design methods in adding protocols and principles for developing secure software. This course contributes to the following Program Objectives: P.L.O. 1: Building on their undergraduate education in computing, students will master advanced concepts across a targeted breadth of computer science study. PLO: 6 Demonstrate the ability to deliver a complete development project, meeting the standards and requirements. IV. Additional Information (for New Courses only) Instructor: Ben Setzer Text: Matt Bishop, Computer Security Prerequisites: Program Admission Objectives: After completing this course 1. The student will be able to explain how the basic concepts of computer security apply to different components of computing systems 2. The student will be able to apply basic cryptographic techniques using existing software and in programs she writes 3. The student will be able to explain important protocols and where they would be applied. 4. The student will be able to explain important classes of malware and apply standard defensive measures. 5. The student will be able to explain how to apply standard responses in the case that malware is present 6. The student will be able to configure and use a network based authorization framework Instructional Method Lecture and projects Method of Evaluation Projects and in-class tests V. Resources and Funding Required (New Courses only) Resource Amount Faculty Other Personnel Equipment Supplies Travel New Books New Journals Other (Specify) $0 $0 $0 $0 $0 $0 $0 TOTAL $0 Funding Required Beyond Normal Departmental Growth $0 VI. COURSE MASTER FORM This form will be completed by the requesting department and will be sent to the Office of the Registrar once the course has been approved by the Office of the President. The form is required for all new courses. DISCIPLINE COURSE NUMBER COURSE TITLE FOR LABEL (Note: Limit 16 spaces) CLASS-LAB-CREDIT HOURS Approval, Effective Term Grades Allowed (Regular or S/U) If course used to satisfy CPC, what areas? Learning Support Programs courses which are required as prerequisites CS 6040 Comp Sec 3-0-3 Fall 2012 Regular APPROVED: ________________________________________________ Vice President for Academic Affairs or Designee __ VII MS-CS Course Syllabus Template CS 6040 Computer Security Syllabus 3 Class Hours, 0 Laboratory Hours, 3 Credit Hours Course Description: This course covers concepts and practices in computer and network security. This includes topics such as cryptography, authentication, authorization, secure protocols and principles for developing secure software. Applications will include using security frameworks to develop software and configuring security support systems. Instructor: Ben Setzer, CL 3043, bsetzer@kennesaw.edu, 770-423-6355 Learning Objectives: After completing this course: The student will be able to explain how the basic concepts of computer security apply to different components of computing systems The student will be able to apply basic cryptographic techniques using existing software and in programs she writes The student will be able to explain important protocols and where they would be applied. The student will be able to explain important classes of malware and apply standard defensive measures. The student will be able to explain how to apply standard responses in the case that malware is present The student will be able to configure and use a network based authorization framework Textbook: Computer Security: by Matt Bishop, Addison Wesley Professional: ISBN-10: 0-201-44099-7 Instructional Methods and Attendance Policy: Courses will meet for lecture, with lectures recorded and available for viewing as recordings (asynchronous). Lectures will include demonstrations. . Course Requirements and Assignments: . The course will meet for traditional lecture. Students will be expected to meet for lecture, take all exams and quizzes and complete and turn in homework assignments for grading. Evaluation and Grading: Evaluation will be through exams, quizzes, grading of lab reports, and attendance at lab sessions. Evaluation will consist of: Midterm Exam: 30% Final Exam: 30% Game Projects and Presentations: 40% 100% Grading Scale: 90%+ A 80-89 B 70-79 C 60-69 D < 60 F Academic Honesty: Every KSU student is responsible for upholding the provisions of the Student Code of Conduct, as published in the Undergraduate and Graduate Catalogs. Section II of the Student Code of Conduct addresses the University's policy on academic honesty, including provisions regarding plagiarism and cheating, unauthorized access to University materials, misrepresentation/falsification of University records or academic work, malicious removal, retention, or destruction of library materials, malicious/intentional misuse of computer facilities and/or services, and misuse of student identification cards. Incidents of alleged academic misconduct will be handled through the established procedures of the University Judiciary Program, which includes either an "informal" resolution by a faculty member, resulting in a grade adjustment, or a formal hearing procedure, which may subject a student to the Code of Conduct's minimum one semester suspension requirement. Students are encouraged to study together and to work together on lab assignments as per the instructor’s specifications for each assignment; however, the provisions of the STUDENT CONDUCT REGULATIONS, II. Academic Honesty, KSC Undergraduate Catalog will be strictly enforced in this class. Disability policy. Kennesaw State University provides program accessibility and reasonable accommodations for persons identified as disabled under Section 504 of the Rehabilitation Act of 1973 or the Americans with Disabilities Act of 1990. A number of services are available to help disabled students with their academic work. In order to make arrangements for special services, students must visit the Office of Disabled Student Support Services (770-423-6443) and arrange an individual assistance plan. In some cases, certification of disability is required. It is the student’s responsibility to take care of this at the beginning of the semester. Schedule and Topic Coverage: Week 1 2 3 4 5 6 Lecture Topic 8 9 10 11 12 13 14 15 Introduction to security concepts Access control techniques and concepts Security and Confidentiality policies Integrity and Hybrid policies Cryptography Cryptography concepts and application Authentication Midterm exam Identity Access control Information flow and confinement Assurance Evaluating systems Malicious logic System and user security Program security 16 Final Exam 7 Projects TBD Reference Chapter 1 Chapters 2 and 3 Chapters 4 and 5 Chapters 6 and 7 Chapters 8 and 9 Chapters 9 and 10 Chapters 11 and 12 Chapter 13 Chapter 14 Chapters 15 and 16 Chapter 17 Chapter 18 Chapter 19 Chapters 24 and 25 Chapter 26 As per Semester Schedule