SYSC4810A-CourseOutline-Fall2022
SYSC4810A-CourseOutline-Fall2022
Prerequisites
Fourth-year status in Communications, Computer Systems or Software Engineering.
Precludes additional credit for COMP 4108.
Prior knowledge
Students should have knowledge of:
• Basic number theory (e.g., prime numbers)
• Numeral systems (e.g., binary, decimal, hexadecimal)
• Basic set theory
• Computer organization (e.g., execution stacks)
• TCP/IP networking concepts
• Programming skills (in C)
Course objectives
Concerns related to the security of modern computer systems and networks, and the
information that they use, store, and communicate, are becoming more commonplace in
our daily lives. Systems today are comprised of broad and heterogeneous
communication networks with many interacting software and hardware components that
can be spread across a variety of application domains, each with their own security
concerns with varying implications and priorities. For example, smartphones, wearable
health-monitoring devices, GPS navigation devices, automobiles, energy grid services,
and even home appliances like washers and dryers now come with Internet connections
by which data from and about the user goes to places where users have little visibility or
control. On one hand, users want the convenience and benefits that added connectivity
brings, while on the other hand, they are growing increasingly worried about the threat
and impact of suffering massive losses of their personal data and information. Computer
security brings these two threads together as technology races forward with “smart"
products that all too often omit the basic controls that can prevent or limit security
attacks and failures.
This course examines the fundamentals of network and software security, and explores
the central problems that confront security designers and administrators including
defining the threats to computer and network systems, evaluating the relative risks of
these threats, and developing effective countermeasures and controls.
The course is intended to cover a broad spectrum of network and software security
fundamentals, while striking a balance between theory and practice. It will provide
students with the foundation and skills needed to become security-conscious engineers.
List of topics
• Security Concepts: Confidentiality, Integrity, Availability, Threats, Attacks, Assets.
• Fundamental Security Design Principles.
• Attack Surfaces and Attack Trees.
• Security Strategies, Policies, and Implementations: Prevention, Detection,
Recovery.
• Cryptography: Symmetric vs. Asymmetric, Hashing, Digital Signatures, Key
Management.
• User Authentication: Passwords, Tokens, Biometrics.
• Access Control Principles: Subjects, Objects, Access Rights, Role-Based vs.
Attribute-Based.
• Trusted Computing and Multilevel Security.
• Malicious Software: Viruses, Worms, Trojans, Bots, Spam, Phishing, Backdoors,
Rootkits.
• Intrusion Detection, Firewalls, and Intrusion Prevention Systems.
• Internet Security Protocols and Standards: SSL, TLS, HTTPS, IPSec.
• Internet Authentication Applications: Kerberos, Certificates, Public-Key
Infrastructure.
• Wireless Network Security and Mobile Device Security.
• Software Security: Buffer Overflows, Handling Inputs/Outputs, Secure
Programming.
• System Security: Operating Systems, Cloud, IoT Security.
• Security Management, Risk Assessment, and Threat Modeling.
• Security Controls, Plans, and Procedures.
• Security Evaluation and Assurance.
• Legal and Ethical Aspects.
Learning outcomes
By the end of this course, students should know and understand:
• Fundamental concepts, terminologies, principles, and theories of network and
software security.
• Primary aspects of a comprehensive security strategy.
• Basic principles underlying the main cryptographic concepts and technologies
available today, including symmetric and asymmetric encryption, hashing, and
digital signatures.
• Security policies (such as authentication, integrity, and confidentiality), as well as
protocols to implement such policies.
• Various types of security threats and attacks on networks and software systems,
how they work, and controls for dealing with them.
• Relevant personnel, legal, and ethical issues related to network and software
security.
By the end of this course, students should be able to:
• Identify the types of threats and attacks that apply to different categories of
computer and network assets.
• Identify suitable countermeasures and security controls for dealing with specific
types of threats and attacks.
• Analyze and specify security properties of simple computing systems.
• Implement and use basic security tools to enhance network and software
security.
• Develop basic security enhancements in stand-alone applications.
It is important to remember that COVID is still present in Ottawa. The situation can
change at any time and the risks of new variants and outbreaks are very real. There
are a number of actions you can take to lower your risk and the risk you pose to those
around you including being vaccinated, wearing a mask, staying home when you’re
sick, washing your hands and maintaining proper respiratory and cough etiquette.
Feeling sick? Remaining vigilant and not attending work or school when sick or with
symptoms is critically important. If you feel ill or exhibit COVID-19 symptoms do not
come to class or campus. If you feel ill or exhibit symptoms while on campus or in class,
please leave campus immediately. In all situations, you must follow Carleton’s symptom
reporting protocols.
Masks: Carleton has paused the COVID-19 Mask Policy, but continues to strongly
recommend masking when indoors, particularly if physical distancing cannot be
maintained. It may become necessary to quickly reinstate the mask requirement if
pandemic circumstances were to change.
Vaccines: Further, while proof of vaccination is no longer required as of May 1 to attend
campus or in-person activity, it may become necessary for the University to bring back
proof of vaccination requirements on short notice if the situation and public health
advice changes. Students are strongly encouraged to get a full course of vaccination,
including booster doses as soon as they are eligible, and submit their booster dose
information in cuScreen as soon as possible. Please note that Carleton cannot
guarantee that it will be able to offer virtual or hybrid learning options for those who are
unable to attend the campus.
All members of the Carleton community are required to follow requirements and
guidelines regarding health and safety which may change from time to time. For the
most recent information about Carleton’s COVID-19 response and health and safety
requirements please see the University’s COVID-19 website and review the Frequently
Asked Questions (FAQs). Should you have additional questions after reviewing, please
contact [email protected].
Self-Declaration Process in Effect for Fall 2022 Term
Since the beginning of the COVID-19 pandemic, Carleton has temporarily suspended
the need for doctor’s notes or medical certificates for academic accommodation
requests related to COVID-19. This decision was made in recognition of the fact that
alternate course delivery and assessment methods present unique challenges and that
it continues to be more difficult than usual for students to see a doctor and obtain
documentation.
As we all continue to navigate ongoing disruptions caused by the public health crisis, we
are extending this process for the Fall 2022 Term.
In place of a doctor’s note or medical certificate, students will be advised to complete
the self-declaration form available on the Registrar’s Office website to request academic
accommodation for missed course work including exams and assignments. Students
will also be encouraged to connect directly with their instructors to discuss required
accommodations arising from the COVID-19 situation.
Textbook
The following textbook is strongly recommended and is available at the Carleton
bookstore.
1. William Stallings and Lawrie Brown, Computer Security: Principles and Practice, 4th
Edition, Pearson, 2018. ISBN: 978-0-134-79410-5
Note: This course may not always follow the textbook closely.
Additional References & Resources
Throughout this course, the following useful references and resources may also be
used:
1. Matt Bishop, Computer Security: Art and Science, 2nd Edition, Addison-Wesley
Professional, 2019. ISBN: 978-0-321-71233-2
2. Wenliang Du, Computer Security: A Hands-on Approach, CreateSpace Independent
Publishing Platform, 2017. ISBN: 978-1-548-36794-7
3. William Stallings, Cryptography and Network Security: Principles and Practice, 7th
Edition, Pearson, 2017. ISBN: 978-0-134-44428-4
4. William Stallings, Network Security Essentials: Applications and Standards, 6th
Edition, Pearson, 2017. ISBN: 978-0-134-52733-8
5. Chuck Easttom, Computer Security Fundamentals, 3rd Edition, Pearson IT
Certification, 2016. ISBN: 978-0-134-47058-0
6. Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, Security in
Computing, 5th Edition, Prentice Hall, 2015. ISBN: 978-0-134-08505-0
Course Webpage
The course announcements, course syllabus, lecture slides used in class, assignments,
and any material needed or used in the problem analysis or lab sessions, can be found
on Brightspace. It is the student’s responsibility to be aware of the information on
Brightspace, and to check regularly for announcements.
Email Correspondence
In order to ensure that you receive a timely response to emails that are sent to the
instructor or TAs, please include [SYSC 4810A] in the Subject, as emails will be
filtered using this identifier.
Students are expected to show and maintain a high-level of professionalism in all email
correspondence. This means that emails should include a proper salutation and sign-
off/signature, and should refrain from using slang, texting abbreviations and acronyms,
and emojis/emoticons.
Note that email is not the best medium for technical questions. Technical questions
submitted by email will be answered at the beginning of the next lecture.
Important Information
Instructor Expectations, Policies, and Notes
1. A regrading request of an assignment, lab, quiz, or exam will be considered by the
instructor only if it is made within the two weeks that follow the return date of the
majority of the concerned assignment, lab, quiz, or exam.
2. The instructor reserves the right to assign extra grades for extra work done by willing
students. However, the work subject to extra grades will be advertised during the
lectures to provide the opportunity to all students.
3. No responsibility for loss of assignments or labs can be assumed by either the
instructor or the TAs. Keep copies of your own assignments and labs.
4. Students are responsible for ensuring that their assignments are submitted correctly
and without corruption.
5. The lectures will not necessarily follow the order in which the topics are presented in
the detailed course outline. Regular class attendance is required.
6. Significant study, reading, and group discussions outside of class are required.
Looking at, or only reading the slides that are provided may not be enough to achieve
the level of understanding required for the assignments and exams.
7. Students are expected to show professional behaviour. This includes being on-time
for lecture, lab, and/or problem analysis sessions, meeting assignment deadlines, and
maintaining a suitable level of professionalism in oral and written (email)
correspondence with the instructor and TAs.
8. Students that are having difficulty with the course content are expected to seek help
early. Students are encouraged to ask questions in class and/or seek help during the
instructor’s office hours.
9. Suggestions on how to improve the course and the instructor’s teaching
methods are always welcomed.
General regulations
Attendance: Students are expected to attend all lectures and lab periods. The
University requires students to have a conflict-free timetable. For more information, see
the current Undergraduate Calendar, Academic Regulations of the University, Section
2.1.3, Course Selection and Registration and Section 2.1.7, Deregistration.
Health and Safety: Every student should have a copy of our Health and Safety Manual.
A PDF copy of this manual is available online: http://sce.carleton.ca/courses/health-and-
safety.pdf
Deferred Term Work: Students who claim illness, injury or other extraordinary
circumstances beyond their control as a reason for missed term work are held
responsible for immediately informing the instructor concerned and for making alternate
arrangements with the instructor and in all cases, this must occur no later than three
(3.0) working days after the term work was due. The alternate arrangement must be
made before the last day of classes in the term as published in the academic schedule.
Instructors may, at their discretion, require students to provide medical documentation
to support requests for accommodation for missed course work including exams and
assignments. As per the Provost’s message of August 27, 2021, for the Fall 2021 term,
students have been instructed to complete the Medical Self-Declaration form available
on the Registrar’s Office website rather than seeking to obtain a doctor’s note or
medical certificate. Instructions for the Winter 2022 term will be communicated by the
Provost’s office.
For more information, see the current Undergraduate Calendar, Academic Regulations
of the University, Section 4.4, Deferred Term Work.
Appeal of Grades: The processes for dealing with questions or concerns regarding
grades assigned during the term and final grades is described in the Undergraduate
Calendar, Academic Regulations of the University, Section 3.3.4, Informal Appeal of
Grade and Section 3.3.5 Formal Appeal of Grade.
Academic Accommodations