IS 2935/TEL 2810: Introduction to Computer Security (Fall-04)

Thursdays 6:00 - 8:50PM

IS 411

James Joshi

Contact Info:
721, IS Building, Tel:412-624-9982

Peter Sutovsky



Hints on programming added for all 3 parts

(Updated on Dec 6)

Final Dec 16


Homework 1

(Due Sept 10)



Homework 2

(Due Sept 17)



Homework 3

(Due Sept 24)



Homework 4

(Due Oct 1)

(There will be a quiz this week)


Homework 5

(Due Oct 10)


Homework 6

(Due Oct 18)


Homework 7

(Due Nov 11)


Programming Assignment
Jave class files

(Due: Dec 3)





lecture 1
Slides, pdf)

lecture 2
Slides, pdf)

lecture 3
(Slides, pdf)

(Read Chapter 3)

lecture 4
(Slides, pdf)

(Chapter 3, SPM; Chap 4)

lecture 5
(Slides, pdf)

lecture 6
(Slides, pdf)

(review slides)

lecture 7
(Slides, pdf)

lecture 8
(Slides, pdf)

lecture 9
(Slides, pdf)

lecture 10
(Slides, pdf)


List of Assigned/Optional Papers


Course Description
This course covers fundamental issues and first principles of security and information assurance. The course will look at the security policies, models and mechanisms related to confidentiality, integrity, authentication, identification, and availability issues related to information and information systems. Other topics covered include basics of cryptography (e.g., digital signatures) and network security (e.g., intrusion detection and prevention), risk management, security assurance and secure design principles, as well as e-commerce security. Issues such as organizational security policy, legal and ethical issues in security, standards and methodologies for security evaluation and certification will also be covered.


  • Basic knowledge of : operating systems, data structures, database systems and networks. 
  • Basic mathematics: undergraduate mathematics, some knowledge about mathematical logic

Students not sure about the required background should meet the instructor.


Computer Security: Art and Science by Matt Bishop (ISBN: 0-201-44099-7), Addison-Wesley 2003

Other Reference Material

Security in Computing, 2nd Edition, Charles P. Pfleeger, Prentice Hall
Security Engineering: A Guide to Building Dependable Distributed Systems, Ross Anderson, Wiley, John & Sons, Incorporated, 2001

Building Secure Software: How to avoid the Security Problems the Right Way, John Viega, Gary McGraw, Addison-Wesley, 2002

          A list of papers will be provided to supplement the book

Course Outline

Security Basics
  • General overview and definitions
  • Security models and policy issues
Basic Cryptography and Network security
  • Introduction to cryptography and classical cryptosystem
  • Authentication protocols and Key Management
  • IPSec, VPNs, E-commerce issues
Systems Design Issues and Information assurance
  • Design principles
  • Security Mechanisms
  • Auditing Systems
  • Risk analysis
  • System verification and evaluation
Intrusion Detection and Response
  • Attack Classification and Vulnerability Analysis
  • Detection, Containment and Response/Recovery

Legal, Ethical Issues

Overview of Miscellaneous Issues (Time permitting)

  • Malicious code, Mobile code
  • Digital Rights Management, Forensics
  • Emerging issues: E/M-commerce security, Multi-domain Security Issues etc.

Lab + Homework/Quiz/Paper review 40%
Two Exams 30%

Paper/Project 20%
Misc. (Seminar, Participation in class) 10%

If you are having a disability for which you are or may be requesting an accommodation, you are encouraged to contact both your instructor and the Office of Disability Resources and Services (DRS), 216 William Pitt Union (412-648-7890/412-383-7355) as early as possible in the term. DRS will verify your disability and determine reasonable accommodations for this course.