CS 426 Course Overview

(Fall 2010)



A survey of the fundamentals of information security. Risks and vulnerabilities, policy formation, controls and protection methods, database security, encryption, authentication technologies, host-based and network-based security issues, personnel and physical security issues, issues of law and privacy.


  • CS354: Operating Systems

Textbook Information

Book For Reference

  • Charles R. Pleeger and Shari Lawrence Pfleeger:  Security in Computing, Third or Fourth Edition. Prentice Hall.
  • Ed Skoudis with Tom Liston:  Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.  Prentice Hall
  • Ross Anderson:  Security Engineering: A Guide to Building Dependable Distributed Systems.  Wiley.


The grade will be based on written written assignments (HW), classroom quizs, (QZ), midterm exam (ME), projects (PR), and final exam (FE), as follows:
Grade = 20% * HW + 20% * PR + 10% * QZ + 20% * ME + 30% * FE.

Exams are closed books and closed notes. 

Homeworks, Quizs, and Projects (tentative)

  • There will be about four homeworks and two to three projects. There will be four in-class quizs. Quizs will be annouced ahead of time.

Academic Integrity

Academic Honesty and Ethical behavior are required in this course, as it is in all courses at Purdue University. The class will be conducted according to the policy written by Professor Gene Spafford. Please take the time to read it carefully. This will be followed unless the instructor provides written documentation of exceptions.

Students are encouraged to talk with the instructor about any questions you have about what is permitted on any particular assignment.