This course introduces the principles and practices of computer security as applied to software, host systems, and networks. It covers the foundations of building, using, and managing secure systems, standard cryptographic functions and protocols, and threats and defenses for real-world systems. See the schedule for details.
Course staff |
Ling Ren (instructor) Adam Bates (instructor) Tzu-Bin Yan (teaching assistant) Tianyang Zhou (teaching assistant) Ryan Ziegler (teaching assistant) |
||||||||||||
Prerequisites | Credit in CS 341 or ECE 391 or both CS 233 and CS 340 | ||||||||||||
Lectures |
Tue./Thu.: 12:30pm - 1:45pm, 1404 Siebel Center for Comp Sci |
||||||||||||
Discussion Sections |
Wed. 1 - 1:50 pm, 2406 Siebel Center for Comp Sci Wed. 2 - 2:50 pm, 2406 Siebel Center for Comp Sci Wed. 3 - 3:50 pm, 2406 Siebel Center for Comp Sci Wed. 4 - 4:50 pm, 2406 Siebel Center for Comp Sci |
||||||||||||
Office Hours |
Thu. 10 - 11 am with Prof. Ling Ren in 4312 Siebel Center for Comp Sci Monday 9:30 - 11:30, Tuesday 3 - 5, Wednesday 4 - 7 in Siebel 0th floor with TAs and CAs. |
||||||||||||
Communications |
We will make use of the following communication methods during this course:
|
||||||||||||
Reference Books |
No textbook is required, but if you would like additional references, we recommend:
| ||||||||||||
Grading |
| ||||||||||||
Ethics and Law |
This course will include topics related computer security and privacy. As part of this investigation we may cover technologies whose abuse could infringe on the rights of others. As computer scientists, we rely on the ethical use of these technologies. Unethical use includes circumvention of an existing security or privacy mechanisms for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in severe academic and legal sanctions. Acting lawfully and ethically is your responsibility. The Computer Fraud and Abuse Act (CFAA) broadly criminalizes computer intrusion. Understand what the law prohibits — you don’t want to end up like this guy. If in doubt, we can refer you to an attorney. | ||||||||||||
Academic Integrity |
The University of Illinois at Urbana-Champaign Student Code should also be considered as a part of this syllabus. Students should pay particular attention to Article 1, Part 4: Academic Integrity. Read the Code at the following URL: http://studentcode.illinois.edu/. Academic dishonesty will be reported to the provost's office and may result in a failing grade. Every student is expected to review and abide by the Academic Integrity Policy: http://studentcode.illinois.edu/. Ignorance is not an excuse for any academic dishonesty. It is your responsibility to read this policy to avoid any misunderstanding. Do not hesitate to ask the instructor(s) if you are ever in doubt about what constitutes plagiarism, cheating, or any other breach of academic integrity. |