|Instructor:||Dr. Jane Ingram||Office Hours:||Mon, Wed: 2:30 - 3:30|
|Office:||365-A Trexler||Tu, Th: 2:45 - 3:45|
|Phone:||375-2446||Also by appointment or drop-in|
Course Objectives: The general objectives of the Computer Science Senior Seminar are to increase the student's ability to do the independent reading and research necessary to keep up with developments in the computing field, to increase the student's experience and skills in written and oral communications, and to increase the student's understanding of the ethical responsibilities of computing professionals. These objectives are met through a seminar style course that focuses on an area or areas of computer science not in the regular curriculum. The seminar topic this year will be computer security.
Text: Computer Security: Principles and Practice, by William Stallings and Lawrie Brown, Pearson Education, 2008. In addition to the text book other resources including scholarly papers will be used.
Course Overview: The course will provide a survey of many aspects of computer security with each student choosing one area for a more in-depth investigation in the final project/paper. Each student will be responsible for at least three class presentations during the semester including a formal presentation of their final project. There will be a variety of types of presentations including "teaching" some concept, reporting results from a scholarly paper, analyzing some security scheme, or arguing a particular viewpoint regarding the ethical and social responsibilities of computing professionals. Students in charge of an oral presentation will also be responsible for providing an assignment for the class (reading and homework).
Intended Learning Outcomes: At the end of the course successful students will be able to:
Attendance Policy: Class attendance is critical in this course. Class will often involve student presentations, discussions, and group work that require the participation of everyone. Attendance at three Department of Mathematics, Computer Science, and Physics Conversation Series lectures is required. There will be several lectures during the semester to choose from for two of these lectures but attendance is required at the lecture "Can We Build Trustworthy Software?" by Dr. Greg Morrisett, Wednesday, March 30.
Grading Policy: The course grade will be based on in-class presentations (including accompanying written work), assignments (problem solutions, short papers, programming) and quizzes, two tests during the term (see tentative schedule for dates), and the final project/paper.
Weights will be assigned as follows (these are subject to change with notice and student input!): Assignments/Quizzes (20%), Presentations (24%), Two Tests (14% each - 28%), MCSP Lectures (3%), Final Project/Paper (25%).
Make-up Policy: Everyone is expected to take the exams and give oral presentations at the scheduled time. Make-ups will be given only for legitimate, documented absences.
Late Policy: Unless otherwise specified, work is to be turned in at the beginning of class on the day it is due. Ten percent per calendar day (24 hours) will be deducted for late work; work will not be accepted if it is handed in more than 3 days late OR after the graded assignment has been returned (whichever comes first).
Co-Curricular Requirement: The Department of Mathematics, Computer Science, and Physics is offering a series of lectures designed to engage the campus community in discussions of ongoing research, novel applications, and other issues that face these disciplines. You are invited to attend all of the events but participating in at least three is mandatory. Within one week of attending an event you must submit to turnitin through Inquire a one page, single-spaced, paper reflecting on the discussion. If you do not turn the paper in within the one week time frame you may not count that event as one you attended.
The Writing Center @ Roanoke College, located in the Goode-Pasfield Center for Learning and Teaching in Fintel Library, offers tutorials and one-on-one sessions for students working on writing assignments. You are encouraged to use the center. Schedule an appointment by going to http://www.roanoke.edu/writingcenter.
Academic Integrity: Students are expected to adhere to the Academic Integrity policies of Roanoke College. All work submitted for a grade is to be strictly the work of the student unless otherwise specified by the instructor. Group work assigned in the course must be the collaborative work of the individuals in the group (and none others). A student who does not contribute to a group assignment is considered to be in violation of the academic integrity policy if that student's name appears on the work handed in. The policies as outlined in the Academic Integrity handbook will be enforced in this course.
Electronic Devices: All cell phones and pagers must be turned off prior to entering the classroom or lab. The use of any electronic device during a test or quiz is prohibited. Any use of such a device will be considered a breach of academic integrity.
Special Needs: If you are on record with the College's Office of Disability Support Services as having special academic or physical needs requiring accommodations, please meet with me as soon as possible. We need to discuss your accommodations before they can be implemented. Also, please note that arrangements for extended time on exams and testing in a semi-private setting must be made at least one week before the exams. If you believe you are eligible for accommodations but have not yet formally contacted the Office of Disability Support Services in the Goode-Pasfield Center in the Library, please contact Bill Tenbrunsel, Associate Dean, at 375-2247 or firstname.lastname@example.org.
Computer Use Policies: All students must abide by the Computer Use policies of the Roanoke College. Failure to do so will result in involuntary withdrawal from the course.
Tentative Schedule (Subject to change with notice.)
|Jan 17||Introduction to Computer Security and Cryptology||Chapters 1, 2; Supplementary Reading|
|Jan 24||Cryptographic Algorithms||Chapters 19 & 20; Supplementary Reading|
|Jan 31||Cryptographic Algorithms, continued||Chapter 20; Supplementary Reading|
|Feb 7||User Authentication; Access Control; Database Security||Chapters 3, 4, 5; Supplementary Reading|
|Feb 14||Intrusion Detection;|
Test #1 (Friday, Feb. 18)
|Chapters 6; Supplementary Reading|
|Feb 21||Malicious Software; Denial of Service||Chapters 7, 8; Supplementary Reading|
|Feb 28||Software Security||Chapters 11, 12; Supplementary Reading|
|Mar 7||Spring Break|
|Mar 14||Internet Security||Chapters 21, 22; Supplementary Reading|
|Mar 21||Social and Ethical Issues;|
Test #2 (Friday, March 25)
|Chapter 18; Supplementary Reading|
|Mar 28||Selected Topics in Computer Security;|
Required Lecture "Can We Build Trustworthy Software?" (Wed, Mar 30 7pm)
|Apr 4||Selected Topics in Computer Security||Supplementary Reading|
|Apr 11||Selected Topics in Computer Security||Supplementary Reading|
|Apr 18||Project Presentations||Supplementary Reading|
|Apr 25||Project Presentations||Supplementary Reading|
|May 2 (8:30)||Final Exam Date - Project Presentations|