Course Number: CSE 465 (70753)
Instructor: Prof. Adam Doupé
Office: BYENG 472
Office Hours: Wednesday 3:00pm–4:00pm, and by appointment
Meeting Times: Tuesday and Thursday, 12:00pm–1:15pm (CAVC 351)
Course Mailing List: firstname.lastname@example.org
Course TA: Faezeh Kalantari
Office: BYENG 423
Office Hours: Monday 10:00am–11:00am, Friday 3:00pm–4:00pm, and by appointment
Professor/TA Communication: email@example.com
This course will provide students with a basic and comprehensive understanding of the problems of information assurance (IA) and the solutions to these problems, especially the security of information on computers and networks. This course will focus on the IA technology as well as IA policy, management, legal, and ethical aspects1.
CSE 310 or equivalent.
All material for the course will be provided in lecture, however we will use an excellent textbook to supplement lecture.
Introduction to Computer Security.
All announcements and communications for the class will take place
through the class mailing list. Students are required to subscribe
the class mailing list:
Student may use the class mailing list to ask questions or clarifications, and the TA, Instructor, or other students can answer. Note that the advice in “How to Ask Questions the Smart Way” will increase the chances of getting your question answered. While I highly encourage students to help each other on the mailing list, please do not go overboard and send your fellow student code (this will be considered cheating). It is better to point out their mistake or direct them to a resource that can help solve their problem, rather than giving them the answer. Note that sharing solutions or answers is expressly prohibited and will result in academic sanctions.
Questions meant for the professor and/or TA should be addressed to the following email address: firstname.lastname@example.org. This email address is sent to the professor and TA, and this will ensure that your email is addressed in a timely manner (faster than just sending an email to one of our addresses).
Also, please if at all possible use the mailing list for communication to me or the TAs (unless the communication is private). This way, the entire class will benefit from your question. Note that if we deem it necessary and helpful, we will CC the class mailing list when replying to direct emails.
- Security Objectives
- Security Mechanisms
- Security Attacks and Threats
- Access Control
- Network Security
- Web Security
- System Security
- IA Policy and Management
- Risk Assessment and Risk Management
- Privacy and Anonymity
- Legal and Ethical Issues
Students will be evaluated on their performance on homework and exams.
There will be three–five homework assignments in the course, covering the material presented in the lectures.
There will be a midterm exam. The exam will cover the material discussed from the lectures and the assignments. No notes or outside material/devices will be allowed.
There will be a final exam that will cover all material presented throughout the course, with an emphasis on material from the second half of the class. No notes or outside material/devices will be allowed.
The preliminary thresholds for assigning a letter grade are the following:
I reserve the right to curve the grades (by lowering the thresholds), depending on the circumstances.
Homework Due Dates and Exam Dates
Homework due dates and exam dates will be posted well in advance on the class website and announced in class.
For each day an assignment is late, a 20% deduction will be assessed. Exams will be given in class and are closed book, closed note, unless otherwise stated. Makeup exams are typically not given unless under extenuating circumstances. Laptops, phones, calculators, and other smart devices are not allowed during exams.
If an exam date conflicts with a religious holiday (in accordance with ACD 304-04) or other university sanctioned activities (in accordance with ACD 304-02) you should let me know at least two weeks before the exam date to schedule a makeup exam.
Students requesting disability accommodations should register with the Disability Resource Center (DRC) and present the instructor with appropriate documentation from the DRC.
Plagiarism or any form of cheating in assignments, projects, or exams is subject to serious academic penalty. To understand your responsibilities as a student read: ASU Student Code of Conduct and ASU Student Academic Integrity Policy.
You are allowed to use code snippets that you find online (StackOverflow or otherwise) provided that you provide, as part of a comment in your source code, the source of the code. The snippets should not constitute a significant part of your code. Using another students’ code, past or present, even with a citation is a violation of the academic integrity policy.
There is a zero tolerance policy in this class: any violation of the academic integrity policy will result in a zero on the assignment and the violation will be reported to the Dean’s office. Plagiarism is taken very seriously in this course. To date, the professor has issued 27 academic integrity policy violations.
Examples of academic integrity violations include (but are not limited to):
Sharing code with a fellow student (even if it’s only a few lines).
Collaborating on code with a fellow student.
Submitting another students code as your own.
Submitting a prior student’s code as your own.
Posting your assignment code online is expressly forbidden, and will be considered a violation of the academic integrity policy. Note that this includes working out of a public Github repo. The Github Student Developer Pack provides unlimited private repositories while you are a student. If you want to impress employers with your coding abilities, create an open-source project that is done outside of class.
Information in the syllabus, may be subject to change with reasonable advance notice.
© Copyright 2017 Adam Doupé as to this syllabus, all lectures, and course-related written materials. During this course students are prohibited from making audio, video, digital, or other recordings during class, or selling notes to or being paid for taking notes by any person or commercial firm without the express written permission of the faculty member teaching this course.↩