Mailing List: We are using Piazza. Registered students will be added automatically. Notify the instructor if you are auditing and want to be added.
Basic notions of confidentiality, integrity, availability; authentication models; protection models; security kernels; secure programming; audit; intrusion detection and response; operational security issues; physical security issues; personnel security; policy formation and enforcement; access controls; information flow; legal and social issues; identification and authentication in local and distributed systems; classification and trust modeling; and risk assessment.For more information, see previous versions of the course.
Textbook InformationNo required textbook.
Book and Resources For Reference
Homeworks, Quizs, and Projects (tentative)
The grade will be based on written written assignments (HW),
classroom quizs, (QZ), midterm exam (ME), projects (PR), and final exam (FE), as
Exams are closed books and closed notes.
Academic Honesty and Ethical behavior are required in this course, as it is in all courses at Purdue University. The class will be conducted according to the policy written by Professor Gene Spafford. Please take the time to read it carefully. This will be followed unless the instructor provides written documentation of exceptions.
It is allowed and in fact encouraged for students to discuss homework questions. However, you should not look at another student's written/typed answers, and you should not show your written/typed answers to another student. Offences will have consequences ranging from receiving a 0 on the HW to being reported to the school, depending on the seriousness of the offence.
Students are encouraged to talk with the instructor about any questions you have about what is permitted on any particular assignment.