FCM 742, Section 01
Instructor: Prof. Douglas Salane
- office: 6.63.6
- web site: http://web.math.jjay.cuny.edu
- Mon., 6:15 - 8:15pm
- Room NB 1.109
Office Hours: Mon. and
Tues., 2:00 - 3:00 pm, or by appointment
Fundamentals of computer networks and distributed processing. Network security policy, risk assessment and management, and protocols
for secure network infrastructures are emphasized.
- Understand basic network security models, polices and protocols
- Be familiar with prominent current threats to network infrastructures
- Understand the methodologies that allow one to determine the risk posed by a threat and the appropriate way to mitigate the risk
- Understand the role psychology and economics play in the compromise of networks and systems
- Understand the importance of industry and legal standards in the design of secure networks
- Be familiar with credible information sources for network security
The course requires some basic background in cryptography, algorithms, programming and network protocols,particularly TCP/IP.
The level of computing background will depend on the type of projects the student chooses. For example, a project that requires
deployment of SNORT to monitor for policy compliance will require the student to be familiar with various network protocols. Projects that
require students to build client/server applications will require the use of Python and require a background in programming.
Jim Kurose and Keith Ross Computer Networking: A Top-Down Approach(6th Edition). Pearson (2013). ISBN-13: 978-0-13-285620-1
William Stallings. Cryptography and Network Security Principles and Practice (6th Edition). Prentice Hall (2014). ISBN-13: 978-0-13-335469-0
A.J. Menezes, P.C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press (2001)
Thomas Corman et al. Introduction to Algorithms (2nd edition). The MIT Press (2001)
Dieter Gollmann. Computer Security (3rd edition). John Wiley & Sons, LTD (2011)
Ross Anderson. Security Engineering (2nd edition). Wiley Publishing, Inc. (2008)
Assignments and Grading:
Readings (35%): Readings and papers will be assigned each week from the texts and the information and computer
security literature. For each assigned paper students must hand in a one page or longer review of the paper.
The review should include a brief summary (in your own words), as well as comments on what you liked about the
paper and what you did not like about the paper or thought was lacking. Finally, there should be a brief
closing paragraph on the impact of the paper on the particular area addressed.
Students may want to include citations to related work. Students must be prepared to discuss the assigned
readings and papers in class.
Projects (40%): There will be three projects assigned during the semester. These may take the form of an extended research paper or a software project, for example, configuring an intrusion detection system to monitor for policy compliance. Those doing a software project must provide complete project documentation and experimental results. The instructor will provide a list of possible projects. Students who have their own ideas for projects should discuss them with the instructor.
Presentations (15%): Students will be required to give one or more presentations during the semester. The presentation will be based on a topic we are discussing or may take the form of a progress report on a project.
Class Participation (10%): Students must be prepared to discuss the assigned readings and participate in class
- You will need access to the suggested texts. They are available for purchase online.
Students are expected to attend all classes and hand in assignments on time. Assigned readings and the reviews must
be completed before the start of each class. Students are expected to participate in class discussions.
Academic Honesty: You only learn if your work is
your own. Cheating on projects or copying assignments will not be
tolerated. Please review the College's policies on Plagiarism and Cheating.
Schedule of Topics