4005-784 Privacy and Security - Course Syllabus

Last updated 2009/11/15 14:06:10


Name: Warren R. Carithers
Office: 3617 Golisano (70-3617)
Phone: (585) 475-5393
Email: wrc AT cs.rit.edu

1. Course Overview

1.1. Course Goal

The goal of this course is to help students become more aware of the issues surrounding the collection, storage, and use of information of all types. Both legal and ethical issues will be addressed. The need to protect information and to provide secure computing facilities will be used to motivate discussion of and experimentation with software tools for the defense of computer systems and networks.

1.2. Course Outcomes

The following are the intended outcomes for this course:

1.3. Course Prerequisites

The prerequisites for this course are:

In addition, students should show:

2. Books

There are two required textbooks for this course:

Other textbooks in the areas covered by this course include:

Any programming work you do for this course will typically be done in C.

3. Grades

The final grade will be determined using the following weights:

  30% Homework/Programming Assignments
  25% Participation
  15% Readings
  20% Research Reports
  10% Presentation

3.1. Homework/Programming Assignments

Homework will be announced in class and posted to the course home page. Homework assignments will be a mix of theoretical and practical questions. Some programming may be required; the exact number of these assignments and their scope will be determined during the quarter.

All homework and programming assignments are due in hardcopy form at the beginning of class on the assigned due date. Late submissions (those that are turned in on the due date, but after the end of class) will be penalized. Submissions will not be accepted after the due date.

3.2. Attendance and Participation

Students are expected to actively contribute to classroom discussions. This includes attending class, asking and answering questions, and contributing personal opinions and experiences to our discussions. Student attendance is also required during graduate student presentations; a portion of your participation grade will be based on your submission of a peer evaluation form for each presentation. Finally, the end-of-quarter "wrapup" session scheduled during final exam week is considered to be a regular class session; attendance and participation during this session will be included in the overall participation grade. This quarter, our "final" is scheduled for Monday, February 22, 2010, 12:30-2:30pm, 70-2690 .

In order to ensure the free exchange of ideas and commentary, it is vital that, at all times, all participants respect the integrity and views of others participating in classroom activities.

3.3. Readings

In order to get used to reading literature pertaining to the course topics, students will also be required to submit short summaries of selected papers and other resources. Students may choose the papers they wish to summarize from the reading list; however only one paper per topic should be chosen.

As with homework and programming assignments, summaries are due in hardcopy form in class. Summaries must be submitted no later than the last class session of the week in which the topic is listed on the reading list; as with homework assignments, summaries submitted after class on that date will be considered late and will be penalized, and summaries will not be accepted after that date. Please do not submit summaries more than one week in advance unless you have cleared this with me beforehand.

3.4. Research Reports

Each graduate student is expected to research two topics related to the course content, and to prepare a term paper of 15-20 pages for each. One paper will be on a privacy-related topic; the other, on a security-related topic. Requirements and grading information can be found in the assignment specification (see the course assignments web page).

3.5. Presentation

Each graduate student is expected to give a presentation to the class based on one of his or her research report topics. These will be scheduled during the last few class sessions. Grading will be based on the quality of the presentation, its information content, and peer evaluations submitted by the other students in the class.

4. Academic Conduct

Academic dishonesty will be dealt with in accordance with DCS and RIT policies.

5. Notes