CSCI-734: FOUNDATIONS OF SECURITY MEASUREMENT AND EVALUATION
RIT
Department of Computer Science |
The course will introduce students into the algorithmical foundations and modern methods used for security evaluation. It will combine a theoretical revision of the methods and models currently applied for computer security evaluation and an investigation of computer security through study of user’s practice. The students will be required to complete a few home assignments, to deliver a class presentation, to implement a team project, to lead the team’s work and to undertake research on the topic assigned. (CSCI-651 Data Communications and Networking I or Permission of the Instructor) Class 2.5, Lab 0.5, Credit 3 (Fall)
Leon Reznik,
PhD
Professor of
Computer Science
Rochester
Institute of Technology
102 Lomb Memorial
Drive
Rochester NY 14623
USA
Ph.: 585 475 7210
Fax: 585 475 7100
email:
lr@cs.rit.edu
http:
//www.cs.rit.edu/~lr
This course is designated as blended. The class meeting time will be reduced. But you will have to spend more time on your independent work and on-line study.
I did not
specify any required textbook for this class for you to buy. However, I want
you to use an excellent brochure, practically a book, which was prepared by
Cyber Security and Information Assurance Center (formerly IATAC) in 2009.
The book “Measuring Cyber Security and Information Assurance: State of the Art
Report” IATAC, May 2009 is available on line at
https://buildsecurityin.us-cert.gov/swa/downloads/MeasuringCybersecurityIA.PDF
and on mycourses.
This class will
extensively use mycourses resources. Much
more information, references and resources could be found on the course mycourses page. All curriculum activities, such as
assignment submissions, online discussions and even tests will be done through mycourses. Please. login
into the course mycourses page as soon as
you are granted the access.
I recommend you
to use one computer security book, which you might already have. I recommend
either M. Bishop Computer Security, Art and Science, Addison-Wesley or J.M. Kizza Computer Network Security, Springer
Component |
Weight |
projects |
50 |
tests |
32 |
research |
10 |
presentations |
8 |
updated: Monday April 16 12:08:00 EDT 2012