Introduction to Computer and Network Security

Course number: 
CIS 4378
Fall 2015
Name E-mail Office location
Chiu C Tan
Science Education and Research Center (SERC) , Room 350

C- or better in CIS 2229 and CIS 3329. May not be taken concurrently


There will be no required textbook for the class. Students may find the following textbooks useful for reference.

  • “The Craft of System Security by Sean Smith and John Marchesini.

  • “Network Security. Private Communications in a Public World by Charlie Kaufman, Radia Perlman, and Mike Speciner.

  • “Elementary Information Security” by Richard E. Smith.

Topics covered: 

Topics include cryptography basics, virtual private networks, secure sockets, e-mail security, firewalls, building secure software, kerberos, web server security, viruses, intrusion detection systems, and privacy issues.

Course goals: 

This course provides an introduction to the inherent insecurities in today’s computer systems and networks, and the commonly used tools and techniques used to secure them.

Attendance policy: 
Attendance to all meetings of the class is mandatory
Accomodations for Students with Disabilities: 
Any student who has a need for accommodation based on the impact of a documented disability, including special accommodations for access to technology resources and electronic instructional materials required for the course, should contact me privately to discuss the specific situation by the end of the second week of classes or as soon as practical. If you have not done so already, please contact Disability Resources and Services (DRS) at 215-204-1280 in 100 Ritter Annex to learn more about the resources available to you. I will work with DRS to coordinate reasonable accommodations for all students with documented disabilities. (
Student and Faculty Academic Rights and Responsibilities: 
Freedom to teach and freedom to learn are inseparable facets of academic freedom. The University has a policy on Student and Faculty and Academic Rights and Responsibilities (Policy #03.70.02) which can be accessed through the following