Ee380 Assignment 0 Solution

Course Structure & Syllabi for BTech  in Mechanical Engineering

(to be applicable for 2013-batch onwards)

                

Course No.

Course Name

L

T

P

C

Course No.

Course Name

L

T

P

C

Semester - 1

Semester -2

CH101

Chemistry

3

1

0

8

BT101

Modern Biology

3

0

0

6

EE101

Electrical Sciences

3

1

0

8

CS 101

Introduction to Computing

3

0

0

6

MA101

Mathematics - I

3

1

0

8

MA102

Mathematics - II

3

1

0

8

PH101

Physics - I

2

1

0

6

ME101

Engineering Mechanics

3

1

0

8

CH110

Chemistry Laboratory

0

0

3

3

PH102

Physics - II

2

1

0

6

ME110/   PH110

Workshop /Physics Laboratory

0

0

3

3

CS110

Computing Laboratory

0

0

3

3

ME 111

Engineering Drawing

1

0

3

5

EE102

Basic Electronics Laboratory

0

0

3

3

SA 101

Physical Training - I

0

0

2

0

PH110/               ME110

Physics Laboratory/Workshop

0

0

3

3

SA 102

Physical Training - II

0

0

2

0

12

4

9

41

14

3

9

43

Semester 3

Semester 4

MA 201

Mathematics-III

3

1

0

8

ME221

Fluid Mechanics - I

2

1

0

6

ME211

Thermodynamics

2

1

0

6

ME222

Manufacturing Technology - I

3

0

0

6

ME212

Solid Mechanics - I

2

1

0

6

ME223

Solid Mechanics - II

3

0

0

6

ME213

Engineering Materials

3

1

0

8

ME224

Kinematics of Machinery

2

1

0

6

HS2xx

HSS Elective - I

3

0

0

6

HS2xx

HSS Elective  - II

3

0

0

6

ME214

Machine Drawing

EE 599/699-002 CYBERSECURITY

Spring 2015

.

[Home] [Syllabus]

News

Instructor: Dr. Sen-ching Cheung (cheung at engr.uky.edu)

Office: DMB 217 (218-0299)

Office hours: Make an appointment

Teaching Assistant: Zhaohong Wang (zhaohong dot wang at uky dot edu)


Lecture

TTh 9:30am-10:45pm (FPAT 265)

Course Description

This course is about cyber-security, which focuses on protecting infrastructure, networks, programs and data from unintended or unauthorized access, change or destruction. As information systems, databases, and Internet-based distributed systems and communication become pervasive, cyber-attacks and digital spying eclipse terrorism to become the top threat to national security. Cyber-security education has emerged as a national goal in the United States and other countries, with implications to both national defense and homeland security.

The goals of this course is to provide an up-to-date survey of developments in cyber-security through study of the theoretical foundation and hands-on practical implementation. Topics covered will include basic security technology, cryptography, security management, risk assessment, operations and physical security, software and network security, as well as ethical and legal issues. A key emphasis of this course is on hands-on experiments which will include encryption/decryption, authentication and authorization protocols, network protection approaches including firewalls and intrusion detection systems, as well as operating systems and application vulnerabilities, exploits, and countermeasures.

Expected outcomes of student learning

·        Understand and discuss the concept of cyber-security management

·        Perform risk assessment of a cyber-system

·        Analyze different methods of attacking and defending cyber-systems

·        Understand basic cryptographic primitives

·        Understand and discuss the concepts of network security and secured protocols

·        Explain the legal and ethical issues of cyber-security

Grading

Your grade will be based on:

Weights

Security Lab exercises

40%

Midterm, Final

30%

Final Competition

30%

           

  1. Homework and Laboratory Exercises

-        They will be assigned roughly weekly.

-        While we will discuss homework in class, each student must do his or her homework.

-        Late homework will not be accepted without prior notice.   

  1. Midterm and Final

-        Online exams in the style of CISSP (Certified Information Systems Security Professional) certification.

-        Closed book and you can take it at home

  1. Final Competition

-        It is a team project of two-three students.

-        All teams will participate in a Capture-the-Flag (CTF) that involves hacking and defending a realistic system.

  1. Grade Assignment

-        The letter grade assignment is based on the following scale: from 100 to 90 pts => A, from 89 to 80 pts. => B, from 79 to 70 pts => C, from 60 to 69 pts. => D, from 59 to 0 pts. => E. 

5.      Plagiarism  

-        I have a zero-tolerance policy for all forms of plagiarism, from copying a homework answer from your friend or solutions from previous terms to cheating in the exams. Not only you will lose all the points for that assignment, the incident will also be reported to the Department Chair who will determine the appropriate disciplinary action.

Required Text

Programming Assignments

There is a fair amount of simulation assignments throughout the semester. Basic familiarity of the Unix system is required. We will apply the knowledge from the class in realistic security scenarios, attacking or defending real servers on the DeterLab testbed for security experimentation. The DeterLabtestbed is a general-purpose experimental infrastructure that supports research and development on next-generation cyber security technologies. The testbed allows repeatable medium-scale Internet emulation experiments for a broad range of network security projects, including experiments with malicious code. We will get you accounts on the DeterLab network. For this purpose, your names and email addresses (first.last@uky.edu) will be forwarded to the DeterLab administrator. Furthermore, we will also use an ensemble software of cryptosystems and cryptanalysis tools called Cryptool in learning different types of encryption, hashing, and digital signatures. DeterLabtestbed can be accessed via any ssh connection and Cryptool runs on Win32 platform.

Prerequisites:

This course is suitable as an elective for electrical engineering, computer engineering or computer science seniors and graduate students. Good working knowledge of the following courses or equivalent is required:

1.      EE 380 Computer Organization

2.      EE 586/CS 571 Computer Networking (desirable)

3.      CS 470 Operating System (desirable)

0 thoughts on “Ee380 Assignment 0 Solution

Leave a Reply

Your email address will not be published. Required fields are marked *