MET CS 895 Developing Secure Systems

Last updated: Monday, May 5, 2006.  The most recent updates are usually in red type

Description: This course is designed for Information professionals who intend to be experts in security policies, procedures, and techniques.  It provides the basis for specialization in areas of security.

Background of Instructors red if changed Learning Objectives red if changed
Evaluation of Students red if changed Plagiarism red if changed
Forum red if changed Policies for class red if changed
Home page for Eric Braude Textbooks and Materials red if changed
Homework and due dates red if changed Topics, Class Dates, and Readings red if changed
How to Contact Eric Braude red if changed
  • Meeting Time: Wednesdays Noon  through 3:00 pm EST
  • Meeting Place: Andover
  • Prerequisites: The prerequisites are as follows, but can be superseded with the consent of the instructor.
    • A course in or experience with programming, preferably in Java, C++ or C#
    • Knowledge of data communication fundamentals

Learning Objectives: Students will …

  • Understand the principles of security
  • Recognize and evaluate security threats
  • Understand the source of security threats
  • Understand the basics of security-aware design and development
  • Plan for security threat mitigation

Textbook and Materials

“Security in Computing,” Third Edition (Hardcover) by Charles P. Pfleeger, Shari Lawrence Pfleeger; Prentice Hall PTR (December 2, 2002); ISBN: 0130355488

Reference Material

An Alternative to the Textbook:

Computer Security (Paperback) by Dieter Gollmann; John Wiley & Sons; 2 edition (January 18, 2006); ISBN: 0470862939

Security in Networks:

Network Security Essentials (2nd Edition); by William Stallings; Prentice Hall; 2 edition (November 20, 2002); ISBN: 0130351288

Policy (Not technical)

Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition; by Thomas R. Peltier; AUERBACH; 2 edition (May 20, 2004); ISBN: 0849319587

Design (Very technical)

Secure Systems Development with UML; by Jan Jürjens; Springer; 1 edition (November 23, 2004)

ISBN: 3540007016


Background of Instructors

Please see the links as shown.

Background of Eric Braude

Background of Lou Chitkushev

Background of Suresh Kalathur

Background of Anatoly Temkin


Evaluation of Students

There will be a midterm, a final, and homework assignments.  The exact weights will be determined during the first third of the course, and will be in the following range.

weight
Midterm 35-50%
Final 35-50%
Homework’s 10-30%

Parts of assignments are evaluated equally unless otherwise stated.

Late homework is not accepted unless there is a reason why it was impossible to perform the work. In that case, the written reason should be attached to the homework, which will be graded on a pass/fail basis.

Please also read detailed information about grade averaging method.


Plagiarism

Please cite all references and uses of the work of other.  All instances of plagiarism must be reported to the College for action.  See plagiarism policy and reference.


Topics, Class Dates, and Readings

Class

#

Date Instructor Textbook Readings Topic
1 May 3 Eric Braude Chapter 1

Chapters 3 and 9 are additional background

The Context of Security

A review of the threat environment

2 May 10 Eric Braude Chapter 8

Except 8.2

Policies and Procedures

We will review the kinds of overall policies and specific procedures that organizations devise in order to counter security threats.

3 May 17 Eric Braude Chapter 9 is general background Security Among Web Services

This class reviews various methods for designing securely on the Internet, from HTTPS to the WS-Security specifications.

4 May 24 Eric Braude Pages 160-162, Specifying Secure Requirements Designs

How design notations, including the Unified Modeling Language, can specify security.

5 May 31 Lou Chitkushev Chapter 8 Developing Security in Distributed Systems
6 June 7 Anatoly Temkin Chapters 2 and 10 Applying Cryptographic Elements

Encryption, conventional and public key; message digest and digital signature; key management

7 June 14 Lou Chitkushev Chapter 8

Developing Network Security

Authentication systems, security standards, Kerberos, public key infrastructure; IPsec, SSL/TLS; PEM, S/MIME; PGP; Firewalls

8 June 21 Eric Braude Midterm
9 June 28 Eric Braude Applying Language Level Security;

Testing for Security

Security policies and permissions, access control, secure class loading, security management

10 July 5 Eric Braude Section 8.2

Developing Security Risk Analyses

Definitions, factors, risk types

11 July 12 Eric Braude Section 8.2

Applying Security Risk Analysis

Risk calculations; trade-offs

12 July 19 Suresh Kalathur Chapter 4

Developing Protection in General Purpose Operating Systems

Access control lists; file protection; authentication

13 July 26 Suresh Kalathur Chapter 5

Designing Trusted Operating Systems

Security policies; security models; assurance; examples

14 August 2 Eric Braude Final

Forum

Web Site: http://groups.yahoo.com/group/895Su06/

Post message: 895Su06@yahoogroups.com
Subscribe: 895Su06-subscribe@yahoogroups.com
Unsubscribe: 895Su06-unsubscribe@yahoogroups.com
List owner: 895Su06-owner@yahoogroups.com