CSCI 430 - Spring 2019
Introduction to Computer and Network
F 1:00 - 4:20 pm in KAP 144
Teams for CTFs|
Sample midterm one and two
Jelena updated some slides in Cryptography slide deck so please re-download them.
Due to MLK holiday, Rajat will hold his office hours on Tue 1/22, 12:30-1:30 at SAL 125.
We will be using Piazza for class discussion. Please try this
first before emailing the instructor or TA.
|Team 1||Team 2||Team 3|
Aneesh, Can, Hao, Valerie||Thomas, Bram, Gina, Zhixu||Zach, Max, Zhuowei, Yuzhi|
Prof Jelena Mirkovic (Contact: email@example.com)
Office hours: F 11:00 - 12:00
and by appointment in RTH 512
- TA:Rajat Tandon (Contact: firstname.lastname@example.org
Office hours: M 11:30- 12:30
and by appointment in SAL 125
Computers and networking are crucial to many aspects of our daily
lives: entertainment, business, personal communication, healthcare,
transportation, utilities, etc. Security of such systems is thus of
paramount importance for protecting our assets or even our lives. This
course will give students an overview of systems security, its
workings, and its role in protecting data and computing
resources. Students will receive both theoretical knowledge of threats
and defenses and practical skills allowing them to implement some
popular threats and defenses in a laboratory setting.
After successfully completing this course, you should be able to:
- Describe and assess a broad range of security problems and
- Understand the fundamental mathematics and engineering
underlying security systems, as well as basic networking and operating
- Judge the suitability of security systems for various
- Install and configure some basic, open-source security systems
- Know how to develop new security systems and features
In addition to lectures students will be engaged through a number of
hands-on homeworks and capture-the-flag (CTF) exercises, where
they will apply the knowledge from the class in realistic security
scenarios, attacking or defending real servers on the DeterLab testbed
for security experimentation.
Prerequisites: CSCI 201 or equivalent (e.g. EE
classes on the same topics), or permission of the
instructor. Please contact the
instructor if you wish to enroll and don't have the prerequisites.
Stallings and Brown, Computer Security (Required), Any edition|
Syllabus / Topics
Exams, Homeworks and CTF Exercises
There will be four homeworks assigned according to the class schedule
and due 1-2 weeks afterwards. These homeworks are to be done
individually, by each student. They require up to 8 hours to complete
and are done remotely on the DeterLab testbed
(http://www.deterlab.net). There will be two CTF (capture-the-flag)
exercises that will be performed in class. Each student will be
assigned to a 6-8 member team. Each team will have to simultaneously
protect their own data/servers and attack data/servers from one other
team. These exercises require 1-2 weeks of preparation (roughly 1-2 h
per day, each work day).
Grades will be calculated based on the following formula:
Late homework policy: Please start homework early and come to
office hours if you need help. There will be no individual extensions
of homework deadlines. You can submit one homework late (up to one
week) with no penalty. Any other homework you submit late will incur
50% penalty, regardless of how late it is.
Final exam: May 1, 2 - 4 pm.
|Class tasks||Percentage of the final
|CTF Exercises (2)||20%|
Students with Disabilities
Any student requesting academic accommodations based on a disability
is required to register with Disability Services and Programs (DSP)
each semester. A letter of verification for approved accommodations
can be obtained from DSP. Please be sure the letter is delivered to me
as early in the semester as possible. DSP is located in STU 301 and is
open 8:30 a.m - 5:00 p.m., Monday through Friday. The phone number for
DSP is (213) 740-0776.
USC seeks to maintain an optimal learning environment. General
principles of academic honesty include the concept of respect for the
intellectual property of others, the expectation that individual work
will be submitted unless otherwise allowed by an instructor, and the
obligations both to protect one's own academic work from misuse by
others as well as to avoid using another's work as one's
own. All students are expected to understand and abide by these
principles. Scampus, the Student Guidebook, contains the Student
Conduct Code in Section 11.00, while the recommended sanctions are
located in Appendix A:
Students will be referred to the Office of Student Judicial Affairs
and Community Standards for further review, should there be any
suspicion of academic dishonesty. The Review process can be found at:
Continuity in a Crisis
In case of a declared emergency if travel to campus is not
feasible, USC executive leadership will announce an electronic way for
instructors to teach students in their residence halls or homes using
a combination of Blackboard, teleconferencing, and other technologies.