CS 448/548

From CS Wiki
Jump to: navigation, search

Survivable Systems and Networks

Catalog Description:

Computers and networks under malicious threat or attack. Attributes of survivability, trustworthiness, dependability and assurance. Threats to survivability, security, reliability and performance. Models and analytical methods to assess survivability, vulnerability, interdependence and risk. Systemic inadequacies and approaches for overcoming deficiencies. Literature review and case studies. Additional project/assignments required for graduate credit.

Total Credits: 3

Course Coordinator: Axel Krings

URL: http://www.cs.uidaho.edu/~krings/CS448/index.html

Prereq: CS J449/J549.

Textbook: None

Prerequisites by Topic:

  • Proficient programming skills in a high level language such as C++ or Java (CS 121)
  • Understanding of basic concepts of programming languages and the benefits and limitations associated with them (CS 210)
  • Ability to use basic software development tools (CS 270)
  • Understand fundamental concepts of computer organization, computer architecture, operating systems and their relationship to application programs (CS 150, CS 240)

Major Topics Covered

  1. Survivability, Attributes of System Survivability
  2. Trustworthiness, Dependability and Assurance
  3. Threats to Survivability, Threats to Security, Threats to Reliability
  4. Threats to Performance
  5. Requirements and Their Interdependence
  6. Systemic Inadequacies, Approaches for Overcoming Deficiencies
  7. Evaluation Criteria, Attempts at Standardization
  8. Architectures for Survivability
  9. Implementing and Configuring for Survivability

Course Outcomes

After completing the course, students should:

  1. Understand basic terminology, definitions and how survivability relates to fault-tolerance and security
  2. Be able to assess what malicious act is and how it affects system design considerations,
  3. Understand the statistical assumptions and impact of complicated hazard functions on survivability quantification,
  4. Understand dissimilarity and knowledge of how N-version and N-variant software can counter common mode faults,
  5. Know how to design systems that address surviving a mix of faults, indicated by hybrid fault models,
  6. Be able to design decentralized services to overcome maliciously induced faults,
  7. Understand risk assessment and management strategies,
  8. Be able to conduct a survivable systems analysis,
  9. Understand of common case studies.