CMSC 498L/ENEE 459L, Fall 2012
Important announcements related to the course will be posted here. Please check this page daily.
Teaching assistant: Joshua Kamdjou (jkamdjou AT gmail.com). Office hours TBA.
Course DescriptionIn this course, we will study contemporary issues in computer security, with a focus on key security challenges and software tools to help discover and remediate potential security vulnerabilities. The course will be held in a computer lab, and 30-50% of class time will be spent doing hands-on lab exercises. Four main topics will be covered during the semester: software security, cryptography and network security, intrusion-detection systems, and hardware security.
The following is a tentative list of topics that may be explored in this class
EthicsIn this course you will learn techniques for both defending and exploiting computer systems, software, and networks. The goal of learning about these exploits is to provide context and understanding for the design of secure systems.
You should never attempt to penetrate or exploit any computer network or system, or adversely affect the operation of a computer network or system, without explicit written authorization from the owner/operator of that network/system. Such actions may be in violation of University of Maryland, State, and/or Federal law.
We expect all students in this class to follow these guidelines. If you are in doubt about the legality, appropriateness, or ethicality of any activities related to this course, please consult one of the course instructors.
Please also read the Office of Information Technology's policy regarding acceptable use of computer accounts.
Academic IntegrityProgramming projects are to be written individually, therefore cooperation or use of unauthorized materials on projects is a violation of the University's Code of Academic Integrity. Any evidence of this, or of unacceptable use of computer accounts, use of unauthorized materials or cooperation on exams or quizzes, or other possible violations of the Honor Code, will be submitted to the Student Honor Council, which could result in an XF for the course, suspension, or expulsion.
Violations of the Code of Academic Integrity may include, but are not limited to:
If you have any question about a particular situation or source then consult with the instructors in advance. Should you have difficulty with a programming assignment you should contact the instructional staff, and not solicit help from anyone else in violation of these rules.
It is the responsibility, under the honor policy, of anyone who suspects an incident of academic dishonesty has occurred to report it to their instructor, or directly to the Honor Council.
Every semester the department has discovered a number of students attempting to cheat on project assignments, in violation of academic integrity requirements. Students' academic careers have been significantly affected by a decision to cheat. Think about whether you want to join them before contemplating cheating, or before helping a friend to cheat.
You are welcome and encouraged to study, compare, or discuss implementations of the programming projects after they have been graded, provided that all the students in question have received nonzero scores for that project assignment, and the project will not be extended in a later project assignment.