Introduction to Security

Fall, 2006-2007

Thursday 3:00 - 5:50PM

Room: IS 405

(Has been changed to IS 404)

James Joshi


Contact Info:
706A, IS Building,





Office Hour

Tuesdays 3:00 - 6:00PM

Or By Appointment

GSA Help
Saubhagya Ram Joshi


(GIS Lab, 4th Floor)

Wednesdays 2:00-4:00PM



[Updated: Nov 30]


Quiz 2

(Dec 14)


Quiz 1

(Nov 16)


Previous Finals

Sample 1

Sample 2


(For Practice)


Project Related


Proposal Sample


Midterm: Oct 12, 2006



Java Special class is postponed to Oct 14



Homework 1

(Posted: Sept 9;

Due Date: Sept 17)


Homework 2

(Posted: Sept 20;

Due Date: Sept 27)


Homework 3

(Posted: Oct 1;

HW Due Date: Oct 8)


Lab 1

(Posted: Oct 1;

(New Due Date: Oct 18)


Homework 4

(HW Due Date: Oct 30)


Lab 2

(Posted: Nov 3;

Due Date: Nov 14)


Homework 5

(HW Due Date: Dec 5)

(Some Useful Notes)

(Java Files)


List of Assigned/Optional Papers




Some Java Resources

GSA's Java Tutorial

Important Links

Security Track




Course Description
This course covers fundamental issues and first principles of security and information assurance. The course will look at the security policies, models and mechanisms related to confidentiality, integrity, authentication, identification, and availability issues related to information and information systems. Other topics covered include basics of cryptography (e.g., digital signatures) and network security (e.g., intrusion detection and prevention), risk management, security assurance and secure design principles, as well as e-commerce security. Issues such as organizational security policy, legal and ethical issues in security, standards and methodologies for security evaluation and certification will also be covered.

Special note: The coverage of this course has been primarily guided by the requirements of some of the CNSS standards (about 85% of the content). In addition, the course also attempts to cater to students who are interested in taking a single course but would like to gain a broad understanding of issues in information security.


  • TEL2000 OR Equivalent Background

In essence, the following is expected of the students

  • Basic knowledge of: operating systems, data structures, database systems and networks; Java.

  • Basic mathematics: undergraduate mathematics, some knowledge about mathematical logic, set notation, etc. These issues will be reviewed in the course.

Students not sure about the required background should meet the instructor.

Special note:

  • The course attempts to explore some theoretical issues for which the stated mathematical background is essential.

  • The course will involve some Java programming.

Students are highly encouraged to use office hours (both the Instructor's or the GSA's) and make special arrangements with the instructor, if additional help is needed.


Introduction to Computer Security: by Matt Bishop (ISBN: 0-201-44099-7), Addison-Wesley (Required Text)

This is a simplified version of (some topics have been removed!)

Computer Security: Art and Science by Matt Bishop (ISBN: 0-201-44099-7), Addison-Wesley. If you have a copy of this book, it should be fine too.

Other Reference Material

Security in Computing, 2nd Edition, Charles P. Pfleeger, Prentice Hall
Security Engineering: A Guide to Building Dependable Distributed Systems, Ross Anderson, Wiley, John & Sons, Incorporated, 2001

Inside Java 2 Platform Security: Architecture, API Design, and Implementation
by Li Gong, Gary Ellison, Mary Dageforde

          A list of papers will be provided to supplement the book

Course Outline

Security Basics
  • General overview and definitions
  • Security models and policy issues

Basic Cryptography and Network security

  • Introduction to cryptography and classical cryptosystem
  • Authentication protocols and Key Management
  • IPSec, VPNs, E-commerce issues
Systems Design Issues and Information assurance
  • Design principles
  • Security Mechanisms
  • Auditing Systems
  • Risk analysis
  • System verification and evaluation
Intrusion Detection and Response
  • Attack Classification and Vulnerability Analysis
  • Detection, Containment and Response/Recovery

Legal, Ethical Issues

Overview of Miscellaneous Issues (Time permitting)

  • Malicious code, Mobile code
  • Digital Rights Management, Forensics
  • Emerging issues: E/M-commerce security, Multi-domain Security Issues etc.

Lab + Homework/Quiz/Paper Review 40%
Two Exams 40%

Paper/Project 20%
Misc. (Seminar, Participation in class) will also be used.

If you are having a disability for which you are or may be requesting an accommodation, you are encouraged to contact both your instructor and the Office of Disability Resources and Services (DRS), 216 William Pitt Union (412-648-7890/412-383-7355) as early as possible in the term. DRS will verify your disability and determine reasonable accommodations for this course.