Course description



Download 0.51 Mb.
Page4/7
Date31.07.2017
Size0.51 Mb.
#25070
1   2   3   4   5   6   7

Course Schedule


A tentative course schedule is given below. There would probably be changes to this schedule during the progress.

Week

Topic

9/10

Syllabus, Information and Security Assurance Lifecycle

9/17

Contributing Factors to Intrusions: Assets, Vulnerabilities and Threats, and Risk Assessment

9/24

Access and Flow Control; security policy and model

10/1

Access and Flow Control (Term project team)

10/8

Cryptography. Term project topic.

10/15

Cryptography.

10/22

Mid-term exam.

10/29

Cryptography and Key Management.


11/5

Authentication and Digital Signature. Start reading project presentation.

11/12

Firewall Design and Network Security.

11/19

Network Security and Intrusion Detection. Term project proposal.

11/26

Intrusion Detection, Reaction and Others.

12/3

IT Governance Using COBIT and VAL IT

12/10

Final Exam.


12/17

Presentation of term projects.


Evaluation and Requirements

  • Mid-term and Final exams: written, open book.

  • 1 Reading project by individual students

    • Present in class and participate in discussions in the second half of semester (starting from 11/5).

    • Each student has about 50 minutes including presentation and Q&A.

    • You will grade each other in terms of coverage, clarity and presentation performances.

  • 1 term project by student teams of 2 students

    • Present the project in class;

    • Write a literature review, and a final report.

  • Attend classes. Achieve consent from the instructor if you have significant event conflicting with the class time. Provide necessary proof to avoid penalty in attendance.

  • No late assignment reports will be accepted. On the due date, you should turn in whatever you have as it is. You are required to take the exam on the date indicated in the schedule. Exceptions are made in extremely rare circumstances with prior approval of the instructor.

Term project:

Students will finish a term project. The project should be relevant to information security in general and technical in nature. While there is a list of suggested topics, you can choose your own topic with the approval from the instructor. I will meet each team at least twice for identifying the study topic.

The term project output will consist of literature review and proposal, and a final report. The final report should not exceed 6000 words in text. You are encouraged to work in teams of 2. Each group has a chance to present in front of the class in the middle and at the end of course. You need produce several slides for about 20-25 minute’s presentation (10 minutes for proposal), and prepare to answer questions. The timeline for the term paper is as follows:

Topic – 10/8

Literature review/proposal – 11/5, presentations – 11/5.

Final report and presentation – 12/17



Grading

  • Final points are calculated using the following table: attendance, 5%; reading projects, 15%; term project, 30%; mid-term exam, 25%; final exam, 25%.

  • Letter grades are assigned as follows: A - 90% and above; B - 75% to 90%; C - 65% to 75%; D - 50% to 65%; E - less than 50%. Curving is made when necessary.

  • Requests for improving the final grade based on needs will not be considered.

Academic Conduct

“The University of Michigan - Dearborn values academic honesty and integrity. Each student has a responsibility to understand, accept, and comply with the university's standards of academic conduct as set forth by the Code of Academic Conduct, as well as policies established by the schools and colleges. Cheating, collusion, misconduct, fabrication, and plagiarism are considered serious offenses. Violations will not be tolerated and may result in penalties up to and including expulsion from the University.”

Each student has a responsibility to understand, accept, and comply with the university’s standards of academic conduct as set forth by the Code of Academic Conduct, as well as policies established by the schools and colleges. Getting help from fellow students or helping others in examination will be a violation. Copying other students’ work or online materials, or quoting others’ work without contribution declarations in reports, will be plagiarism activity. At my discretion, any or all papers submitted in this course may be submitted to a plagiarism detection service. The penalty on confirmed violation ranges from zero points on assignments to expulsion from the school.



Download 0.51 Mb.

Share with your friends:
1   2   3   4   5   6   7




The database is protected by copyright ©ininet.org 2024
send message

    Main page