Welcome to CS 5352/6352: Computer Security, Spring 2025. The primary goal of this course is to provide fundamental concepts and applied methods of computer security that addresses various confidentiality, integrity, and availability related challenges associated to data, system, and network assets.
Tentative topics include Crosscutting Concepts in Cybersecurity, Risks and Vulnerabilities, Adversarial Attacks, Network Protocols and Internet Security, System and Software Vulnerabilities, System Access and Authentication, Web Security, Human Security, Protection Against External and Internal Threats, Controls and Protection Methods, Applied Cryptography, Issues of Law and Privacy, and Ethical Issues.
Tentative topics include Crosscutting Concepts in Cybersecurity, Risks and Vulnerabilities, Adversarial Attacks, Network Protocols and Internet Security, System and Software Vulnerabilities, System Access and Authentication, Web Security, Human Security, Protection Against External and Internal Threats, Controls and Protection Methods, Applied Cryptography, Issues of Law and Privacy, and Ethical Issues.
Objectives
- Analyze security vulnerabilities of a network and develop a set of solutions for specific networking scenarios.
- Analyze security vulnerabilities of a network and develop a set of solutions for specific networking scenarios.
- Explain the various controls available for protection against Internet attacks, including authentication, integrity check, firewalls, and intruder detection systems.
- Exhibit an understanding of the threats posed by various types of malicious codes.
- Describe different ways of providing authentication of a user or program.
- Describe the mechanisms used to provide security in programs, operating systems, databases and networks.
- Find and utilize available online resources as they pertain to developing a secure system.
- Describe the background and properties of widely used encryption algorithms.
- Develop comprehensive plans for network security using a range of available tools.
- Describe legal, privacy and ethical issues in computer security.
- List and explain the typical set of tasks required of an information security professional.
The best way to reach me is via email stalukder@utep.edu, but please do not expect email replies on the same day or weekends. It is very important that you send email from an utep.edu address and identify yourself, your course, and the section that you are in. Please do not use the Blackboard email or messaging facility, which is sometimes unreliable.
Please Remember
Our goals are for you to succeed in this course and to teach you skills and concepts that will contribute to your success in life. To this end, here's some advice that you may find particularly useful:- Do not stress over grades: your goal is to learn new and exciting things. Good grades follow naturally from deep learning (but not necessarily vice versa). ...and employers care about what you know not what grade you got.
- Participate: you will get a lot more from this class if you ask questions and engage with the instructor than if you are a fly on the wall - and it will be more fun.
- Manage your time wisely: allocate sufficient time for homework and learning. In particular, use class time to learn, review the material presented in lecture the same day, and schedule time for homework proactively.
- Start homework early: racing against a deadline is so stressful! Starting early will remove that stress, lead to deeper learning and give you time to improve your solution.
- Get all the help you need: we provide plenty of resources to help you succeeed in this course - office hours, online help, and friendly staff when you need them. Take advantage of them: they are there for you!
- Make time for fun: take a break from studying at least once a day - meet with friends, go for a walk, play sports, whatever gets you to reset your mind.