Introduction to Computer Security Fall 2020
This course teaches the security mindset and introduces the principles and practices of computer security as applied to software, host systems, and networks. It covers the foundations of building, using, and managing secure systems. Topics include standard cryptographic functions and protocols, threats and defenses for real-world systems, incident response, and computer forensics. See the schedule for details.
Section 001: Tue./Thu. 12:00–1:30 (Zoom)
Section 002: Tue./Thu. 1:30–3:00 (Zoom)
|See calendar below. Lab sections will introduce tools and techniques that are important for completing the projects. All labs and office hours will be held remotely. Visit any professor’s office hours for help with security concepts. Visit any TA’s office hours for assignment help or grading concerns.|
|Communication||We'll use Piazza for announcements, discussion, and questions about assignments and other course material. Assignments will be collected via GitHub and returned via Canvas. For administrative issues, email email@example.com.|
No textbook is required, but if you would like additional references, we recommend:Security Engineering by Ross Anderson
Cryptography Engineering by Ferguson, Schneier, and Kohno
Security Research at Michigan
Security Reading Group (SECRIT)
EECS 588 (graduate-level security class)
|Prerequisites||EECS 281 required; EECS 201 and EECS 370 recommended|
|Calendar||The course calendar is displayed below. All listed times are in Eastern Time. Click here and then the small '+' sign at the bottom right corner to import into your personal Google Calendar.|
We'll calculate your course grade based on these components:
|Assignments||65%||Five projects (All projects can be completed with at most one partner, but you can work alone if you'd like. We strongly encourage you to find a partner as soon as possible, especially for projects 3 and 5.)|
|Participation||5%||Weekly quizzes and forum activity, questions and intellectual contributions|
|Final Exam||30%||One exam covering all material from the course (December 15)|
Ethics, Law, and University Policies
Warning To defend a system you need to be able to think like an attacker, and that includes understanding techniques that can be used to compromise security. However, using those techniques in the real world may violate the law or the university’s rules, and it may be unethical. Under some circumstances, even probing for weaknesses may result in severe penalties, up to and including expulsion, civil fines, and jail time. Our policy in EECS 388 is that you must respect the privacy and property rights of others at all times, or else you will fail the course.
Acting lawfully and ethically is your responsibility. Carefully read the Computer Fraud and Abuse Act (CFAA), a federal statute that broadly criminalizes computer intrusion. This is one of several laws that govern “hacking.” It is your responsibility to understand what applicable law prohibits. If in doubt, we can refer you to an attorney.
Please review the university’s policy on Responsible Use of Information Resources for guidelines concerning proper use of information technology at U-M, as well as the Engineering Honor Code. As members of the university, you are required to abide by these policies.
Students with Disabilities
If you believe you need an accommodation for a disability, please let an instructor know at the earliest opportunity. Some aspects of courses may be modified to facilitate your participation and progress. As soon as you make an instructor aware of your needs, they can work with the Services for Students with Disabilities (SSD) office to help determine appropriate academic accommodations. Information you provide will be treated as private and confidential.
Mental Health and Wellness
The University of Michigan is committed to advancing the mental health and well-being of its students. A variety of issues—such as strained relationships, anxiety, alcohol or drug problems, and depression—can directly impact student academic performance. If you or someone you know is feeling overwhelmed, depressed, or otherwise in need of support, services are available. Contact Counseling and Psychological Services (CAPS) or University Health Service (UHS).
For the safety of all students, faculty, and staff on campus, it is important for each of us to be mindful of safety measures that have been put in place for our protection. By returning to campus, you have acknowledged your responsibility for protecting the collective health of our community.
Course lectures will be audio/video recorded and made available to all students in this course. As part of your participation in this course, you may be recorded. If you do not wish to be recorded, please contact the course staff at firstname.lastname@example.org the first week of class to discuss alternative arrangements. To prevent revealing your identity on recordings, please mute your video during lecture. Also, questions can be submitted via Zoom chat if you do not wish to reveal your voice.
Students may not record or distribute any class activity without written permission from the instructor, except as necessary as part of approved accommodations for students with disabilities. Any approved recordings may only be used for the student’s own private use.