CSC789 Special Topic:  Information Warfare

Lectures:

Monday and Wednesday, 5:30 pm - 6:45 pm (Room CHE 101)

Prerequisites:

Graduate Standing and Permission of Instructor

Website:

Course Home Page: http://web.cs.unlv.edu/jh/CSC789/  

Resource Page: http://web.cs.unlv.edu/jh/CSC789/Resources/

Final Exam:

TBA

Credits:

3

Course Description

As per John Alger’s definition, Information Warfare (IW) consists of those actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective or victory over an adversary.  Adversaries can be nations, corporations or individuals.  As the sophistication, frequency and damage of computer-based IW attacks has increased, the inherent limitations of traditional approaches towards hardening current software and hardware infrastucture has become apparent.  Part of this problem is due to the massive deployment of internet-accessible hardware and software that was originally designed for limited access, unconnected environments.

This seminar course will survey various offensive and defensive IW techniques that involve the use of computer systems.  Offensive techniques that are already in the public domain will be studied in the context of how to mount a defense against them or how they can be used as part of a “reactive” defense.  This course will address unconventional approaches towards designing and maintaining secure computing systems that must operate in a completely hostile environment.  These novel systems must posess the capability to anticipate attacks, warn of attacks, automatically respond to attacks, heal themselves if compromised, learn from the attack, and retain memory of the experience that can be shared with other systems.  Each system may perform all of these tasks independently of, or collaboratively with, other “friendly” systems. 

This course differs from a conventional computer or network security class in that it does not focus exclusively on traditional techniques for defending information, privacy and contemporary computing systems from preexisting types of threats.  While knowledge of these topics is vital for todays security practitioner, this course focuses on novel, experimental techniques and computing architecture to be incorporated in the design of next-generation secure computing infrastructure.  This infrastructure will be less vulnerable to both existing and future types of attack, and will actively and automously respond to attack.

Course Objective

Upon completion of the course, the student will have acquired an awareness of IW issues (as they related to computer systems).  The student will also have acquired in-depth technical expertise in several IW areas.  The student will have acquired the ability to undertake research in the field of IW.

Instructor - Dr John Harrison

Phone:

(702) 895-4133

Email:

jh @ cs.unlv.edu (remove spaces on either side of the @ symbol)

Office:

TBE B372-A

Office Hours:

Monday and Wednesday, 3:45 pm - 5:00 pm
Other times by appointment only.

Course Methodology

This course will be structured in a seminar style, with numerous student presentations and class discussion.  Students will review, and present, literature from various subject areas such as network and computer security, combo-malware, the integration and analysis of information extracted from both open and compromised sources, compartmentalization and recovery of compromised systems and system components, applied machine learning and self-healing autonomous systems.  Students will then identify a topic of special interest to themselves, and approved by the instructor, and then undertake a project relating to the topic. 

The workload in the course will be as follows:

Class Presentations:  Student will be expected to make several class presentations during the semester based on reading assignments issued by the instructor (and supplementary related material obtained independently by the student).  The number of presentations made by each student will depend on the number of students in the class but will be no less than 3.  Students must create their own presentation material.  Students should arrange to meet the instructor during his office hours no later than two days prior to the scheduled presentation date.  This meeting is for the purpose of reviewing the presentation material.  Presentations must be prepared for display on a digital projector using either MS Powerpoint, OpenOffice or Adobe PDF.  Hardware will be provided for the presentation however you are welcome to use your own notebook computer if you wish.

Assignments and Class Participation:  Students who are not presenting on a particular week may be expected to review material relating to the presentation, which will be specified by the instructor.  This reading must be performed in advance of the presentation.  All students, including the presenter, may be given an assignment based on the reading material.  The assignment will be due at the start of the class that the material is being presented.  It is also expected that students will contribute to classroom discussion on a regular basis.  The instructor will assign class participation grades based on his evaluation of the student’s in-class contribution.  Note that there may be additional assignments given that are unrelated to class presentations.

Research Project:  Each student will undertake a research project during the semester.  The project must be approved by the instructor but can be in an IW area of special interest to the student.  Many types of projects are acceptable.  The project could include advanced study on a topic presented by the student (or another student) during the semester.  Alternatively, the project could include the design and implementation of software, or the novel application / demonstration of sophisticated experimental software created by someone else.  All projects will require a class presentation.  A group project will be acceptable under certain circumstances.

Course Resources

There is no assigned IW textbook for the course that you must purchase.  Instead course resources will be provided by the instructor in class, or will be available on the WWW or via the course website (see CSC789 Resources ).

Evaluation

·        In-Class Presentations: 40%

·        Assignments and Class Participation: 20%

·        Research Project: 40%

Ethics Advisory

Nothing in this course should be taken as encouragement or incitement to crack, e.g., access, modify or interfere with computer systems without permission, or develop software that does so.  In addition to being unethical and hurtful, these actions can (and do!) lead to civil and criminal prosecution.  You are welcome to seek guidance from the instructor on these topics. 

Any experimentation with software that is potentially dangerous to other systems, e.g., has the capability to self-replicate, should only be conducted on a system that is not, nor will be, connected to the internet until all secondary storage is erased and other safety steps are taken.  (All CS lab machines are connected to the internet.)  If you wish to perform such an experiment, please seek advice from the instructor regarding access to special computer resources.

Breaking into systems to “demonstrate” security problems, even if you have good intentions, can at best cause a headache to overworked system administrators but can also compromise and disrupt systems and can lead to civil and criminal prosecution.  If you identify a vulnerability, do not exploit it.  Please contact the appropriate administrators confidentially.  Keeping abreast with the latest security patches, methods and malware defense tools is difficult and the implementation of practical security measures involves weighing risks and costs.  Consequently, any advice or suggestions that you may give to a system administrator may not be acted upon quickly.  This is especially true in a relatively low security environment such as a university, where open access has traditionally been put above security and resources for system administrators are very scarce.  This does not mean that your contribution has been ignored or that your advice has not been taken seriously.

Computer Labs

The primary UNLV laboratory resource for this class will be B-361 but, due to the nature of the course, in certain cases other computer resources may be available (see the instructor for details). Students are welcome to use their own computer resources.  Any problems with Lab resources in B-361 are to be reported to the School’s system administrator, Mr John Kowalski at johnmk@cs.unlv.edu.

UNLV Policies

“Learning Enhancement Services” (LES) houses “Disability Services”, “Tutoring Services”, and “Learning Strategies”.  If you have a documented disability that may require assistance, you will need to contact LES for coordination in your academic accommodations. LES is located in the Reynolds Student Services Complex in room 137. The DRC phone number is 895-0866 or TDD 895-0652. Their website is: http://www.unlv.edu/studentlife/les.

The University requires all members of the University Community to familiarize themselves and to follow copyright and fair use requirements. You are individually and solely responsible for violations of copyright and fair use laws. The University will neither protect nor defend you nor assume any responsibility for employee or student violations and fair use laws. Violations of copyright laws could subject you to federal and state civil penalties and criminal liability as well as disciplinary action under University Policies. To help familiarize yourself with copyright and fair use policies, the University encourages you to visit its copyright web page at: www.unlv.edu/committees/copyright/.

Course Change Disclaimer

For a number of reasons, the syllabus and assessment may change during the semester.   Students will be given adequate time to prepare for any changes that do occur.