Welcome to my class CSCI-734: FOUNDATIONS OF SECURITY MEASUREMENT AND EVALUATION

RIT Department of Computer Science
Syllabus ----- Schedule

CSCI-734: FOUNDATIONS OF SECURITY MEASUREMENT AND EVALUATION


Instructor: Dr. Leon Reznik                                 Contact Information Introductory letter

Please, note: all information on this site is provisional. It is provided only as an initial reference. After enrollment, please, use information from Mycourses, which is regularly updated.

Catalogue Description

The course will introduce students into the algorithmical foundations and modern methods used for security evaluation. It will combine a theoretical revision of the methods and models currently applied for computer security evaluation and an investigation of computer security through study of user’s practice. The students will be required to complete a few home assignments, to deliver a class presentation, to implement a team project, to lead the team’s work and to undertake research on the topic assigned. (CSCI-651 Data Communications and Networking I or Permission of the Instructor)

Course Outcomes

Course Policies

This class may be taught in a blended mode; in this case the class meeting time will be reduced but the students will have to do more work independently and online. Please, see Welcome to my class letter and mycourses for further information

Required Materials

I want you to use an excellent brochure, practically a book, which was prepared by Cyber Security and Information Assurance Center (formerly IATAC) in 2009. The book “Measuring Cyber Security and Information Assurance: State of the Art Report” IATAC, May 2009 is available on line and on mycourses.

Additional Resource

This class will extensively use mycourses resources. Much more information, references and resources could be found on the course mycourses page. All curriculum activities, such as assignment submissions, online discussions and even tests will be done through mycourses. Please, login into the course mycourses page as soon as you are granted the access.

I recommend you to use one computer security book, which you might already have. I recommend either M. Bishop Computer Security, Art and Science, Addison-Wesley or J.M. Kizza Computer Network Security, Springer

Grading

ComponentWeight
 Projects  50
  Tests 32
 Presentations  8
 Research  10

CS Common Course Policies Include:


@Leon Reznik 2002-2012 Unauthorized reproduction is NOT allowed