CS 450/650 Fundamentals of Integrated Computer Security

Department of Computer Science & Engineering

UNR, Spring 2010

Course Information - Description - Objective - Prerequisites - Textbooks - Syllabus
Organization - Grading - ABET Criteria - Schedule - Announcements

Course Information

Class hours Monday & Wednesday, 11:00 am - 12:15pm @ PE 208 Security in Computing, 4th Edition University of Nevada, Reno
Instructor Dr. Mehmet H. Gunes
E-mail mgunes (at) cse (dot) unr (dot) edu
Web page http://www.cse.unr.edu/~mgunes
Office SEM 230 (Scrugham Engineering-Mines)
Office hours Monday & Wednesday, 2:30 - 4:00 pm or by appointment

Catalog Description

Network security, database and system security, access control, policy and ethics development, attacks, and counter attack measures, security tools and malicious code, current trends and research.


The objective of this course is to cover principles of computer and network security along with some relevant background in basic cryptography. We will discuss various attack techniques and how to defend against them. After completing this course, students will be able to analyze, design, and build secure systems of moderate complexity.



Required Recommended

Syllabus (Tentative)

This is a tentative list of topics, subject to modification and reorganization.
  1. Introduction to computer security
  2. Cryptography and cryptographic protocols
  3. Software security
  4. Operating system security
  5. Network and Web security
  6. Malicious code analysis and defense
  7. Advanced topics and case studies (to be chosen according to instructor and student interest)


Grading (Tentative)

Both grading policy and scale are subject to change. Failure in either the assignments or the tests will result in failure in the course.

Grading Policy

Grading Scale

Important Note: You will have one week to appeal for your grades after the graded assignments/tests are returned. So, please keep this in mind if you think that there is a problem/issue with the grading of your work.

ABET Criteria

ABET Accreditation Criterion 3 Program Outcomes that are relevant to this course are:

Schedule (Tentative), Notes & Assignments

This is a tentative schedule including the exam dates. It is subject to readjustment depending on the time we actually spend in class covering the topics.

Permanent reading assignment: it is assumed that you are familiar with the contents of the slides of all past meetings.

Date Lectures Assignments & Notes
Wed, Jan 20 Lecture #1: Introduction  
Mon, Jan 25 Lecture #2: Elementary Cryptography  
Wed, Jan 27 Lecture #3: Entropy  
Mon, Feb 1 Lecture #4: Data Encryption Standard  
Wed, Feb 3 Lecture #5: DES and Rivest-Shamir-Adelman Homework 1: Cryptography  
Mon, Feb 8 Lecture #6: RSA  
Wed, Feb 10 Lecture #7: Advanced Encryption Standard and Cryptographic Hash Functions  
Mon, Feb 15 President's day (no class)  
Wed, Feb 17 Lecture #8: Secure Hash Algorithm Lab 1: Cryptosystem Implementation and Analysis 
Mon, Feb 22 Lecture #9: Digital Signatures
Intrusion Prevention Systems by Justin
Wed, Feb 24 Lecture #10: Key Exchange
MiTM attacks and ARP vulnerabilities by Christopher
Mon, Mar 1 Lecture #11: Digital Certificates  
Wed, Mar 3 Lecture #12: Program Security
Trusted Computing by Jeffrey
Homework 2: Cryptographic Systems and Program Security  
Mon, Mar 8 Lecture #13: Program Security (cont)
Virus Encryption by Joshua
Wed, Mar 10 Midterm Exam  
Mon, Mar 15 Spring break (no class)  
Wed, Mar 17 Spring break (no class)  
Mon, Mar 22 Lecture #14: Program Flaws  
Wed, Mar 24 Lecture #15: Malicious Codes
Virtualization attacks and Redpill by Michael
Mon, Mar 29 Lecture #16: Targeted Malware
History of Digital Rights Management by Alex
Wed, Mar 31 Lecture #17: Operating System Security
Obscurity and Code Availability by Evander
Homework 3: Password Cracking  
Mon, Apr 5 Lecture #18: Access Control
Trojan horse & Backdoor intrustion by Nathan
Wed, Apr 7 Lecture #19: User Authentication
Quantum Cryptography by Jacob
Mon, Apr 12 Lecture #20: Trusted Operating Systems
Password Cracking with Rainbow Tables by Spencer
Wed, Apr 14 Lecture #21: Trusted Operating Systems
Non-Malicious Program errors by Gabriel
Lab 2: Trusted Computing  
Mon, Apr 19 Elliptic Curve Cryptography by Anusha
Privacy and Social Networks by Hakan
Spam by Victor
Denial of Service Attacks by Clayton
Wed, Apr 21 Website Vulnerabilities by Brian
WPA2 by Winway
Security Hardware by Zakary
Honeypots by Javier
Mon, Apr 26 Lecture #22: Network Security
Packet Sniffing by Aarti
Wed, Apr 28 Lecture #23: Network Threats
Hacking WEP by Troy
Homework 4: O.S. and Network Security  
Mon, May 3 Lecture #24: Secure Communications  
Mon, May 10
at 9:45 am
Final Exam (Exam covers post-midterm material. However, students are expected to remember important pre-midterm concepts.)  


Announcements regarding the course will be posted on this web page and WebCT. Please check your WebCT e-mail daily.

Course Information - Description - Objective - Prerequisites - Textbooks - Syllabus
Organization - Grading - ABET Criteria - Schedule - Announcements

Last updated on May 3, 2010