MSI 416: Communications Networking & Security
Download Spring 2005 syllabus: msi604syllabus.pdf
Instructor InformationName: Sanjay Goel / Jakov (Yasha) Crnkovic
Email: email@example.com / firstname.lastname@example.org
Phone: (518)442-4925 / (518) 442-5318
Office Location: BA 310b / BA 332
Office Hours: (Goel) M 1:00-2:30 or by appointment / (Crnkovic) MW 10 - 11:30
Class InformationTime: TH 9:05am-12:10pm
Dates: January 20 - April 28
Call #: 4321
Available Lab(s): BA222
This course covers Data Communications, Computer Networking and Computer Security. The first module of the course focuses on communications where we discuss fundamentals of signal transmission, transmission hardware and basic communication concepts such as error control and multiplexing. The second module of the class covers Network Topologies, the OSI model, and the TCP/IP protocol suite. This module also covers the various architectures used on the Internet, including client-server, peer-to-peer and n-tier architectures. Also covered is network switching and schemes for routing data on the network. Students will have the opportunity to use network simulation tools. In the third module of the class, vulnerabilities of computer networks and techniques for protecting networks and data are discussed. Basic elements of symmetric and asymmetric cryptography are discussed. Secure Electronic Commerce, involving secure transmission, authentication, digital signatures, digital certificates and Public Key Infrastructure is also presented. Issues in privacy, ethics and policies are also discussed where students study technologies like Web Bugs and Carnivore and debate on ethical issues related to privacy.
Students will learn:
The class can be supplemented upon student request by immersion classes which are full day classes covering special topics in Computer security. The content of the classes may vary based on the interest of the audience and the availability of the instructor. This is not a mandatory part of the class and is strictly volunteer (without any grade implication) based on the interests of the students. The three potential classes are:
For the most part, the first half of each class will be conducted in the classroom and the second half of the class will take place in the computer lab. The students will learn basic concepts in the first half of the class and go through an exercise applying these concepts in the second half. Please come prepared with the readings since the class will move at a brisk pace.
There will be assignments that need to be done to understand the subject material. Please work individually on all assignments unless otherwise specified. It is okay to discuss the concepts and questions with other colleagues, but it is improper to copy each other's work. Not all assignments will be graded, however, please make sure that you complete all your assignments. The assignments must be submitted in the class one week after the assignment with your name and the assignment number clearly marked on the assignment sheet.
Text & Reference Books
Text: Data Communications & Computer Networks: A Business Users's Approach by Curt M. White
Text: Security In Computing (Third Edition) by Charles P. Pfleeger & Shari Lawrence Pfleeger
Reference: Hackers Beware by Eric Cole
Reference: Professional Java Security by Jess Garms and Daniel Somerfield
Copyright © 2013, Sanjay Goel. All Rights Reserved.