CMSC 414-0101
|
Computer and Network Security
|
Fall 2008
|
http://www.cs.umd.edu/~shankar/414-F08
Check at least twice weekly. See News for last update
News
Overview
This course is an introduction to the broad field of computer network security,
examining algorithms and protocols for
confidentiality, authentication, non-repudiation, anonymity, etc.,
and applications involving them (secure email, secure web tranactions, etc.).
Required text:
Network Security: Private Communication in a Public World, 2nd edition
by Kaufman, Perlman, and Speciner.
ISBN 0-13-046019-2.
Course topics:
Sections from text,
roughly in the order to be covered.
In case you're wondering,
the first edition of this book is fine for most of the course.
There are only a few chapters (IPsec, SSL) that we cover
which are not present in the first edition.
So if you can access this material, the first edition should suffice.
Class notes:
Programming projects
Will be updated versions of my Fall 07 414 projects.
Practice exams
The only "practice" exams I will post will be the midterm exams from previous semesters,
which are also publicly available on the previous class web pages.
I suggest you don't look at this exam prematurely.
In my opinion,
the best use of this exam is to first prepare for this semester's midterm
and then do the practice exam under exam conditions (including time duration)
and see how you score
(the scoring guidelines are also included in the exam solution).
Homeworks
Regrade requests
Any regrade request (for exams, homeworks, projects) must be submitted
within a week of the grade being posted.
Grading
-
Midterm ------ approx 30% (Nov 4)
-
Final ---------- approx 30% (Fri Dec 19 1:30pm-3:30pm)
-
Project 1 ------ approx 5% (posted around end of September).
-
Project 2 ------ approx 30% (posted around start of November).
- Homeworks --- approx 5%
Academic Integrity
Homeworks and programming projects are to be done individually.
You may consult outside references when doing the homework,
as long as these sources are properly referenced, you write up the solution yourself,
and you understand the answer.
For example, if you look at other source code,
you may not copy the code directly in your program,
but you may model your program after it. And you must reference it!
Academic dishonesty.
This page and all problem sets, lecture notes, and exams linked to
it are copyrighted.
Use of these pages for the class CMSC414 at the University of Maryland
is permitted. Any other use requires permission of the author
(Udaya Shankar, shankar@cs.umd.edu).