CSE 4482

Computer Security Management:
Assessment and Forensics

Fall, 2013


  Lecture Schedule:      Tuesday  19:00 - 22:00,  ACW 002

  Instructor:                 Natalija Vlajic (vlajic @ cs.yorku.ca)

  Office Hours:              Tue and Thu  11:00 - 12:00 (CSEB 2047)
                                     and by appointment
  TA:                             Dusan Stevanovic (dusan @ cse.yorku.ca)

      Course News
  • Dec. 30:  Final exam scores and preliminary final grades are now available through ePost.
  • Dec. 30Final exam solutions can be found here.
  • Dec. 9:  The final examination will take place on Sunday, Dec 15, VH 3006 (7:00 - 10:00 pm). The exam is closed book and closed notes. Basic calculators allowed! 40% of questions will be related to the material covered before and 60% to the material covered after the midterm examination.
  • Dec. 9:   Project grades are now available through ePost.
  • Nov. 26:   Assignment 3 is now available. Due date: Dec 15, 2013 (bring assignment to the final exam).
  • Nov. 12:   Assignment 2 is now available. Due date: Nov 26, 2013 (bring assignment to the class).
  • Nov. 4:   Lab 1 grades are now available through ePost.
  • Oct. 29:   Today's lecture is cancelled. The makeup lecture (Student Presentations) will take place on Dec 3.
  • Oct. 29:   Lab 2 is now available Lab 2 due date: Nov 12, in class.
  • Oct. 26:   Midterm and Assignment 1 grades are now available through ePost. Midterm solutions can be found here. Assignment 1 solutions can be found here.
  • Oct. 18:   IMPORTANT: Oct 22 Guest Lecture will be held in Lassonde (LAS) 3033. Attendance mandatory!
  • Oct. 9:   IMPORTANT: Midterm exam will be held on Oct 15, 7:00 pm, in room Lassonde (LAS) 3033. NOTICE THE CHANGE OF LOCATION! The exam will be 75 min long, closed book and closed notes.
  • Oct. 1:   Lab 1 is now available Lab 1 due date: Oct 22, in class. OPNET IT Guru can be downloaded free of charge (after going through a quick registration procedure) from: http://www.opnet.com/university_program/itguru_academic_edition/. The software is also available at the Networking and Security Lab - CSEB 2007.
  • Sept. 17:   Assignment 1 is now available. Due date: Oct 1, 2013 (bring assignment to the class).
  • Sept. 10:   Classes begin.  Location: ACW 002.

   Course Information:

   Course Material:

   Course Policies:

   Course Schedule & Notes:

Required Reading
Important Dates
T, Sep. 10
Introduction: Information Security, Threats, Attacks

T, Sep. 17
Management of Information Security,
Security Organization,
Security Policy

Assignment 1
Due Date:  Oct 1, 2013 (in class)
T, Sep. 24
Risk Assessment and Risk Management (part 1)

T, Oct. 1
Risk Assessment and Risk Management (part 2)
Protection Mechanisms: Access Control (part 1)

Opnet IT Guru Lab 1
Due date:  Oct 22 (in class)
T, Oct. 8
Protection Mechanisms: Access Control (part 2)
Protection Mechanisms: Firewalls (part 1)

T, Oct. 15
Midterm - location: Lassonde (LAS) 3033 !
Protection Mechanisms: Firewalls (part 2)

T, Oct. 22
Guest Lecture
    M. Lungu - Project Manager Cryptographic Services, RBC
    P. Ndebele - Senior IT Auditor, TD Bank
    W. Rajibi - Chief Security Architect for Info. Management, IBM
location: Lassonde (LAS) 3033 !

T, Oct. 29

Opnet IT Guru Lab 2
Due date:  Nov 12 (in class)
T, Nov. 5
Protection Mechanisms: IDPS

T, Nov. 12
Protection Mechanisms: Scanning and Analysis Tools

Assignment 2
Due date:  Nov 26 (in class)
T, Nov. 19
Law and Ethics
Introduction to Computer Forensics

T, Nov. 26
Forensics in Windows

Assignment 3
Due date:  TBD

T, Dec 3
Student Presentations

Final Examination:  Sunday, Dec 15 - 7pm, VH 3006

  Recommended Reading Material:

   Grading Scheme:

   Software Tools:

Basic Tools:
Ping, Traceroute, Whois, Netstat, Nmap
Packet Sniffers:
Vulnerability Scanners:
Intrusion Detection Tools:
Password Cracker:
Cain and Abel, LCP
Forensic Tools:
Wireless Sniffers:

     Term Project:

As a part of this course, students will be required do a term project, and thus execute some limited independent research in the area of computer security. Term projects will complement and extend the lecture material. The list of possible project topics, together with up 2-3 starting references, can be accessed from: List of project topics, F 2013.

Each project team will consist of 2 students. Students themselves are responsible for finding their project partner, selecting a project topic, and then registering both (group and topic) with the course instructor before September 24 (through e-mail). The final allocation of project topics will be done on the 'first-come-first-served' basis.

The project work will be assessed through
1)  10-page long written report submitted no later than November 19 (single spacing, 11 point font size),
2)  15-min oral presentation on November 26.

The project assessment will be based on the following criteria:
- written report (content, structure, syntax, proper citations, reference section, etc.)  - 50%
- oral presentation (clarity and general understanding) - 50%

   Course Description:
This course introduces the student to the fundamental concepts of information security: confidentiality, integrity, availability, authentication, auditing, information privacy, legal aspects. Other more advanced topics covered in the course include: development of security policies, access control, risk management, incident response, inappropriate insider activity, ethics.


Any 12 credits at the 3000-level.

   Late Assignments and Missed Midterm:

Late assignments will not be accepted, unless a prior arrangement is made with the instructor.
Makeups of missed midterm exams are only possible in extremely exceptional situations (such as verifiable medical emergencies) or by arrangement well prior to the exam, provided there is an extremely compelling reason.

   Academic Honesty:

"The Department takes the matter of academic honesty very seriously. Academic honesty is essentially giving credit where credit is due. And not misrepresenting what you have done and what work you have produced. When a piece of work is submitted by a student it is expected that all unquoted and uncited ideas and text are original to the student. Uncited and unquoted text, diagrams, etc., which are not original to the student, and which the student presents as their own work is considered academically dishonest." For more see:  Department of Computer Science Academic Honesty Guidelines.