Instructor
Email: click here
Office Hours:
Mondays 4:30-6:30pm, in St. Mary's Hall rm G-36, and Wednesdays 5:00-6:00pm, at The Midnight Mug, and by appointment
TA
Email: click here
Office Hours:
Mondays 5:00-6:00pm, in St. Mary's Hall rm G-37 and Thursdays 12:00-2:00pm, at The Midnight Mug
TA
Email: click here
Office Hours:
Mondays 3:30-4:30pm, at The Midnight Mug and Wednesdays 11:00-1:00pm, in St. Mary's Hall rm G-37
This course introduces students to network security. By examining case studies and reading seminal research papers, students will learn about network attacks and vulnerabilities as well as current defenses. Topics covered include cryptography, confidentiality and authentication protocols, botnets, firewalls, intrusion detection systems, and communication privacy and anonymity.
Prerequisites: COSC-052
This introductory course will impart a broad understanding of the underpinnings of security techniques, security best practices, and computer security research. The course should help students to understand the mindsets of attackers (the bad guys and gals who do malicious things on the network) and system designers and defenders (the good guys and gals who try to stop the attackers). The course should prepare students to understand and assess security threats, become familiar with security engineering best practices, and write better software, protocols, and systems.
This class covers both offensive and defensive computer and network security techniques. Enrollment in this class does not constitute a waiver of Georgetown's Acceptable Use Policy. Students are expected and required to obey all University policies. Talk to the instructor before conducting any network experiments.
The strongly suggested textbook for this class is Introduction to Computer Security by Michael Goodrich and Roberto Tamassia. All book readings, listed below, are optional. Non-book assignments (that is, the links to articles) are mandatory.
Note: To access the slides, you will need to be signed into Google with your NetID (e.g., foo123@georgetown.edu) and NetID password. Please do not request access from a personal GMail account.
Reading 1:
Book, sec 1.1
No Class
Reading 1:
End-to-end Arguments in System Design
Reading 2:
Book, chapter 5
Reading 1:
Book, sections 1.3, 8.1
Reading 2:
Socket Programming HOWTO
Homework 0 [instructions]:
Due by 11:59pm
Reading 1:
Book, sec 8.3
Reading 1:
Book, sections 8.2, 8.4
Homework 1, part 1 [instructions]:
Due by 11:59pm
Reading 1:
Book, section 7.1.2
No Class
Reading 1:
Security Problems in the TCP/IP Protocol Suite
Homework 1, part 2 [instructions]:
Due by 11:59pm
Reading 1:
Book, section 6.1
Reading 1:
Book, section 6.5
Reading 2:
Security Flaws in 802.11 Data Link Protocols
Reading 1:
Tor: The second-generation onion router
Homework 1, part 3 [instructions]:
Due by 11:59pm
Reading 1:
Book, sections 6.2 and 6.3
Reading 1:
Book, section 6.4
Reading 1:
Book, sections 7.0-7.2
Reading 1:
Book, section 7.3
Reading 1:
Click Trajectories
Reading 1:
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation
Homework 2 [instructions]:
Due by 11:59pm
Reading 1:
Sybil attack
Homework 3 [instructions]:
Due by 11:59pm