Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

Master of Science in

VIEWS: 9 PAGES: 31

									           Master of Science in
Computer Security and
Information Assurance


                      For more information contact:
                    Rochester Institute of Technology
B. Thomas Golisano College of Computing and Information Sciences
      Department of Networking, Security, and Systems Administration
                        152 Lomb Memorial Drive
                            Building 70 – 2145
                       Rochester, New York 14623
                          (585) 475-2700 (voice)
                           (585) 475-6584 (fax)
R.I.T. - - Effective: 9/01/2008                                                                                         1




                                               Table of Contents

Course plan for M.S. in Computer Security and Information Assurance……3
Entrance Requirements ...................................................................................... 4
Cost of Program .................................................................................................. 6
Financial Aid........................................................................................................ 6
Information .......................................................................................................... 7
Core Course Descriptions .................................................................................. 8
Elective Course Descriptions ............................................................................ 8
Worksheet ......................................................................................................... 10
Thesis Completion Procedures ....................................................................... 21
Forms ................................................................................................................. 23
Frequently Asked Questions ........................................................................... 19

                       ROCHESTER INSTITUTE OF TECHNOLOGY
              B. Thomas Golisano College of Computing and Information Sciences



                                        Master of Science
                           Computer Security and Information Assurance

Introduction
The Masters Degree in Computer Security and Information Assurance (MS/CSIA)
program at RIT consists of a core curriculum, electives, and a capstone thesis. The core
provides students with a solid background in the theoretical principles underlying
computer security and information assurance, which ensures that graduates acquire the
intellectual tools necessary to keep up-to-date in this rapidly evolving discipline. The
electives provide students with the opportunity to obtain depth in computer security and
information assurance in areas of interest to them. The electives add the necessary
knowledge required of our graduates by industry. This combination prepares our
graduates to become leaders in the computer security and information assurance area.
This will also prepare the graduates for academic or research careers in this area as well
as further academic study.

The advanced electives provide students with the ability to choose their area of expertise
in software engineering, computer science, or networking and systems administration.

The program is designed for students who have an undergraduate major or minor in
computer science as well as those who have a strong background in a field in which
computers are applied, such as Engineering, Science, Math or Business. In some cases
students will be required to complete certain bridge courses to ensure them meeting the
prerequisites of the program.

This degree program is a cooperative program involving four departments in the
Golisano College:

          The Department of Computer Science
R.I.T. - - Effective: 9/01/2008                                                  2



          The Department of Information Technology
          The Department of Networking, Security, and Systems Administration
          The Department of Software Engineering

The curriculum is designed, maintained, and controlled by a committee with
representatives from each of the above departments. The program is administered by
the Department of Networking, Security, and Systems Administration.
 R.I.T. - - Effective: 9/01/2008                                                          3



                                       BRIDGE (Prerequisites)
         1016-281                            4002-716                      4055-746
         Calculus I                       C++ Programming              Telecom Network
                                             Workshop                      Protocols

         1016-282                             4003-713                      4055-761
         Calculus II                      Operating Systems           Principles of System
                                                                         Administration

        1016-265                                                          4010-361
      Discrete Math                                                  Software Engineering



                                               CORE
       0110-745                               4010-748                    4055-726
 Ethics in Technology                      Secure Software            Research Methods
                                           Engineering R&D

        4005-705                              4055-755                    4055-780
      Cryptography I                   Secure Wireless Networks    Computer System Security

       4005-774                                                    4055-896 Proposal Dev (1)
   Secure Databases                                                 4055-897 MS Thesis (3)



                                   ELECTIVES (choose 16 credits)
      4002-876                                 4005-749                   4055-882
 Secure E-Commerce                       Topics in Data Comm.         Enterprise Security

       4055-886                              4005-800                      4055-760
 Security Audits of Web                  Theory of Computer          Computer Viruses and
Servers and Applications                     Algorithms               Malicious Software

      4055-841                                                             4005-706
  Advanced Forensics                                                    Cryptography II




          Course plan for M.S. in Computer Security and Information Assurance
                                     (Details below)
R.I.T. - - Effective: 9/01/2008                                                         4




Entrance Requirements
Degree applicants should minimally have a baccalaureate or equivalent degree from an
accredited institution of higher education and a minimum cumulative grade-point
average equivalent to 3.0 out of 4.0 („B‟ average). International students must also have
a 3.0 out of 4.0 from an accredited university using the US system of grading, or a first
class degree from an accredited university using the British system of grading.

Additionally, applicants with degrees from foreign universities must submit Graduate
Record Examination (GRE) scores. The GRE may also be required for those applicants
requesting consideration whose undergraduate grade-point average is less than 3.0/4.0.

Applicants whose native language is other than English must take and submit the
TOEFL examination. A minimum score of 570 (paper-based exam), 230 (computer-
based exam) or 80 (internet-based exam) is required. Applicants with a lower TOEFL
may be admitted conditionally. However, they will be required to take a prescribed
program in English along with a reduced program course load until the required English
level is achieved.

Information about the GRE and the TOEFL examinations is available at www.ets.org.

RIT’s reporting number for ETS’s GRE and TOEFL examinations is 2760.

Application & Deadlines
The application process typically takes four to six weeks after the Office of Graduate
Enrollment Services has received a complete application. However, international
applications may take longer due to slower physical mail. The Graduate Program
Coordinator in the Department of Networking, Security, and Systems Administration only
evaluates applications after all of the information has been submitted and verified by a
counselor in RIT‟s Office of Graduate Enrollment Services.

Students can be admitted at various times during the year. However, acceptance into
the program does not guarantee availability of classes. As the start of the quarter
approaches, many classes become full. Students, who apply just before the start of a
quarter, may need to wait until the following quarter before starting their course work.

The application deadline schedule is shown below:

         Quarter           Typical Starting    Domestic           International
                           Date of Quarter    Application           Residents
                                               Deadline        Application Deadline
             Fall             September 1      August 10               July 1
          Winter              Not Permitted   Not Permitted        Not Permitted
          Spring                  March 1      February 1            January 1
         Summer               Not Permitted   Not Permitted        Not Permitted
R.I.T. - - Effective: 9/01/2008                                                          5


All applicants are required to submit the following:
         An electronic or paper application.
         A well-written statement of purpose that discusses your background and the
            personal goals that this degree will support.
         Application fee.
         Valid transcripts from all universities listed on the application.
         Two recommendations from educational and/or professional sources.

An electronic graduate application is available at the URL
http://www.rit.edu/emcs/ptgrad/grad_app.html. (Note: there is an underscore (_) between
the „d‟ and the „a‟ in “grad_app”.) This web site can also be reached from the
“Admissions” link on the RIT home page, at the URL http://www.rit.edu/. Requests for
information can be made from this web site.

We may be able to start you in coursework while your application is being processed.
Please feel free to contact the IT Graduate Coordinator at nssaGradPgm@rit.edu about
this option.

Prerequisites
Applicants wishing to enter this master‟s program are expected to have the equivalent of
an undergraduate degree in computer networking and/or systems administration. Other
degree programs may also suffice (e.g., Computer Science, Software Engineering,
Computer Engineering) depending on the student‟s course work and/or work experience.
The specific prerequisites are:

         Mathematical maturity, including calculus and discrete mathematics.

         A knowledge of basic networking, including: Ethernet, TCP/IP, routing and
          switching, cable construction, and basic LAN design and construction principles.

         Knowledge of basic networking infrastructure services, including DHCP, DNS,
          and other discovery and name resolution protocols.

         Knowledge of basic system services and system administration functions,
          including scripting for Unix, user administration, networked file systems, web
          services, networked information systems (such as NIS), and networked security
          and permission issues.

         Knowledge of programming in C or Java.

         Knowledge of computer operating systems.

         Knowledge of basic software engineering principles.

Students without this background, but with a strong background in computing (including
programming) may pursue completion of these prerequisite via a program of courses
offered by RIT or another institution to bridge them into the M.S. degree program.
.
R.I.T. - - Effective: 9/01/2008                                                            6


The Bridge Program
Ideally, students will have the required coursework or documented experience before
matriculating in the M.S. degree program. Students, whose undergraduate preparation
or industrial/work experience does not satisfy the above requirements can make up this
deficiency through study, taking one or more of courses as prescribed by the Graduate
Program Coordinator. This coursework may be done at any accredited college or
university that is convenient.

Students are expected to achieve a 3.0 („B‟ grade) or better average in course work
done as part of the bridge program. Bridge program courses are not part of the 48-
quarter credit hours required for the master‟s degree. No bridge courses may be applied
toward degree requirements. Grades for bridge courses are not included in a student‟s
graduate grade-point average, if taken before matriculation. However, grades for bridge
courses taken after matriculation are included in student‟s graduate grade-point average.

Students who have been admitted to the program before completing prerequisite
requirements must complete bridge coursework within the first two (2) quarters of
matriculation. Prior approval of the Graduate Program Coordinator is required before any
other courses in the program may be taken.

To meet individual needs, a bridge program can be designed differently from that
described above. Other courses can be substituted, or courses at other colleges can be
applied. For example applicants studying at a distance may take equivalent courses
from their local community colleges or universities. However, such programs must be
approved in advance. Contact the Graduate Program Coordinator for approval prior to
beginning bridge work.

The Curriculum
This program of study consists of thirteen courses (48 quarter-credit hours) which
include the core coursework (28 credits), sixteen (16) credits of electives from a
prescribed set of courses, and the thesis capstone experience (4) credits.

Cost of Program
For academic year 2008-2009, the cost of graduate study is $800/credit or $3,200 for
each 4-credit course in the N&SA program of study. Full-time students are charged
$9,497 per quarter ($28,491 per year).

Financial Aid
The Department of Networking, Security and Systems Administration can offer a small
Merit Scholarship to qualified students who are not receiving financial support from other
sources, such as from an employer, etc. The maximum award is currently 30% of the
cost of tuition per quarter. The merit scholarship is awarded initially for one (1) academic
year (three quarters) from the quarter in which the student is admitted. The initial award
usually does not cover the fourth quarter (typically summer) in the first year of study. For
the fourth quarter and each year following the initial award, the student must submit an
application to request continuation of the scholarship. The award will, in general, be
extended if the student maintains at least a 3.0 GPA, which is the minimum required to
graduate from a MS program at RIT.
R.I.T. - - Effective: 9/01/2008                                                 7


Information
Additional information may be obtained by contacting:
       US Mail:
                Graduate Program Coordinator
                Department of Networking, Security and Systems Administration
                Rochester Institute of Technology
                152 Lomb Memorial Drive
                Rochester, New York 14623-5608
       E-mail:
                nssaGradPgm@rit.edu
       Telephone:
                (585) 475-2700 (v/tty)
       FAX:
                (585) 475-6584
R.I.T. - - Effective: 9/01/2008                                                                                8



                Computer Security and Information Assurance
                            Course Descriptions
Core Course Descriptions

0110-745 Legal and Ethical Issues in Technology Intensive Environments
The course confronts graduate students with a wide variety of legal and ethical issues in organizational
environments that are technologically intensive, such as information technology and the life sciences.
Impacts of intellectual property legislation and legal cases in national and international venues are
investigated. Legal and social issues involving individual privacy are argued. This exposure to legal and
ethical dilemmas is an important tool as the graduates encounter such situation throughout their careers.
Coupled with technical proficiency the ability to deal with legal and ethical issues shapes professional
successes and failures. Not available to students who have completed 0102-785. Credit 4

4005-705 Cryptography
The course is devoted to the review of basic cryptographic algorithms, their implementation and usage.
Classical encryption techniques and those of Rivest-Shamir-Adleman and EL Gamal will be seen in depth,
and an overview of several others will be presented. This course also presents authentication schemes and
interactive proof protocols. Students will write a term paper, either theoretical based on literature or
reporting a student’s own implementation or experiments with a chosen cryptographic scheme.
Depending on the size of the group, some or all students will give a presentation to the class. (4003-263
or 4003-334; 1016-265; set by instructor) Class 4, Credit 4

4005-774 Secure Database Systems
This course explores policies, methods and mechanisms for protecting enterprise data. Topics include
data reliability, integrity, and confidentiality; discretionary and mandatory access controls; secure
database architectures; secure transaction processing; information flow, aggregations, and inference
controls, and auditing; security models for relational, object-oriented, statistical, XML, and real time
database systems. Programming projects are required. (4002-484, or 4003-485, or 4010-443 or equivalent)
Class 4, Credit 4

4010-748 Secure Software Engineering: Requirements and Design
Overview of the secure software issues and principles that should be addressed during requirements
engineering and design. Topics include: risk management and software requirement specification.
Designing for security and security in implementation. (4010-361) Credit 4, Class 0, Lab 0

4055-726 Research Methods in NSSA
This seminar introduces students to the MS in networking, and system administration by providing an
opportunity to meet the faculty involved in the program and their fellow students. Students will learn
about current areas of research in networking, security, and system administration and the areas of
research interest of the faculty. To encourage students to begin thinking about their final project or
thesis, students will develop a research proposal that may serve as the basis for their later thesis
proposal. In addition, this course provides an overview of the academic research methodologies used in
graduate level work. Topics include: experimental research, correlation, experiment observation,
surveys, and case studies. Also included will be document structure, validation, and the process for
submission and review to conferences and journals. Class 4, Credit 4

4055-780 Computer System Security
This course provides an introduction to computer network security. The areas covered will include the
liability, exposure, opportunity, and ability to exploit various weaknesses in a networked computer
environment. The forms of the attacks and the detection and defense of the attacks will be discussed.
The issues and facilities available to both the intruder and administrator will be examined and evaluated
with illustrative laboratory exercises. (4055 761 or equivalent, co requisite: 4055-780 lab) Class 3, Lab 2,
Credit 4

4055-755 Secure Wireless Networks
This course is designed to provide students with the foundation needed to understand the problems of
network security, perform a risk analysis to ascertain the threats and cost of an attack, and design and
implement security strategies to effectively build a defense to minimize the effects of these attacks.
(4055-746 or equivalent knowledge) Class 4, Credit 4
Elective Course Descriptions
    R.I.T. - - Effective: 9/01/2008                                                                              9




    4002-876 Secure eCommerce
    This course covers the concepts required to implement a secure e commerce site. Topics include the
    assessment of security in a proposed or an existing site, the implications of decisions impacting security
    and the implementation considerations needed to establish a secure site. (4002-875) Class 4, Distance
    Format, Credit 4

    4005-706 Cryptography II
    This course investigates advanced topics in cryptography. Topics include an overview of necessary
    background in algebra and number theory, private and public key cryptosystems, and basic signature
    schemes. Additional topics include number theory and basic theory of Galois fields used in cryptography;
    history of primality algorithms and the polynomial time test of primality; discrete logarithm based
    cryptosystems including those based on elliptic curves; interactive protocols including the role of zero-
    knowledge proofs in authentication; construction of untraceable electronic cash on the net; and quantum
    cryptography. Other topics may include digital watermarking, fingerprinting, and steganography.
    Programming will be required. (4005-705 Cryptography I or 4003-482 and permission of instructor)

    4005-749 Topics in Data Communication
    Current topics in the field. The format of this course is a combination lecture and seminar. Students may
    register for this course more than once. Topics covered in the past include: network reliability, special-
    purpose protocols, error-correcting codes. Programming projects will be required. (Permission of the
    instructor, completion of the bridge program) Class 1–4, Credit 1–4 APPROVAL REQUIRED

    4005-800 Theory of Computer Algorithms
    This course provides an introduction to the design and analysis of algorithms. It covers a large number of
    classical algorithms and their complexity and will equip students with the intellectual tools to design,
    analyze, implement, and evaluate their own algorithms. (1016-265 Discrete Math I, 4003-334-CS 4) Class
    4, Credit 4

    4055-760 Computer Viruses and Malicious Software
    This course involves the study of malicious software (Malware) including computer viruses, worms, and
    Trojan horses. Topics include the various mechanisms used in the construction of malicious software;
    existing commercial anti-virus software; preventative and reactive means for dealing with malicious
    software on workstations, servers and in networks; training and education of users; and reliable sources
    to monitor for alerts as well as the prevention of hoaxes. (4002-716 C++ for Programmers or equivalent)
    Class 3, Lab 2, Credit 4

    4055-841 Advanced Computer Forensics
    This course provides students with knowledge and understanding of computer forensics. It will also
    provide a theoretical foundation for the techniques and methods needed for the extraction of information
    from digital devices. Students will gain exposure to the spectrum of available computer forensics tools
    along with developing their own tools for “special needs” situations. The core forensics procedures
    necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications
    of the process, will be covered on both Unix and Windows under multiple file systems. (4002-716 or
    equivalent and 4055-761 or equivalent) Class 4, Credit 4

    4055-882 Enterprise Security
    This course is designed to provide students with the advanced concepts needed to establish network
    security strategies to ensure adequate protection for the corporate environment and yet provide
    accessibility for the corporate community. (4055-761 and (4055-815 or 4055-746).) Class 4, Credit 4

4
0
5
5
-
8
8
6

S
    R.I.T. - - Effective: 9/01/2008   10



e
c
u
r
i
t
y

A
u
d
i
t
s

o
f

W
e
b

S
e
r
v
e
r
s

a
n
d

A
p
p
l
i
c
a
t
i
o
n
s

T
h
i
s

c
o
u
r
s
e

w
i
l
    R.I.T. - - Effective: 9/01/2008   11



l

p
r
o
v
i
d
e

s
t
u
d
e
n
t
s

w
i
t
h

a
n

i
n
t
r
o
d
u
c
t
i
o
n

t
o

p
r
o
c
e
s
s
e
s

a
n
d

p
r
o
c
e
    R.I.T. - - Effective: 9/01/2008   12



d
u
r
e
s

f
o
r

p
e
r
f
o
r
m
i
n
g

a

t
e
c
h
n
i
c
a
l

s
e
c
u
r
i
t
y

a
u
d
i
t
i
n
g

o
f

w
e
b

s
e
r
v
    R.I.T. - - Effective: 9/01/2008   13



e
r
s

a
n
d

w
e
b

b
a
s
e
d

a
p
p
l
i
c
a
t
i
o
n
s
.

S
t
u
d
e
n
t
s

w
i
l
l

n
o
t

o
n
l
y

e
x
p
l
o
r
e
    R.I.T. - - Effective: 9/01/2008   14




t
h
e

e
x
i
s
t
i
n
g

X
M
L
/
W
e
b
S
e
r
v
i
c
e
s

t
h
r
e
a
t
s
,

b
u
t

a
l
s
o

l
e
a
r
n

t
o

a
p
p
l
y
    R.I.T. - - Effective: 9/01/2008   15




a
p
p
r
o
p
r
i
a
t
e

a
u
d
i
t
i
n
g

t
o
o
l
s

t
o

i
d
e
n
t
i
f
y

n
e
w

v
u
l
n
e
r
a
b
i
l
i
t
i
e
s

e
x
    R.I.T. - - Effective: 9/01/2008   16



i
s
t
i
n
g

i
n

o
r

s
t
e
m
m
i
n
g

f
r
o
m

w
e
b

s
e
r
v
e
r
s

a
n
d

a
p
p
l
i
c
a
t
i
o
n
s
.

S
t
u
d
e
    R.I.T. - - Effective: 9/01/2008   17



n
t
s

w
i
l
l

w
r
i
t
e

a
n
d

p
r
e
s
e
n
t

t
h
e
i
r

a
u
d
i
t

r
e
p
o
r
t
s

o
n

w
e
b

s
e
r
v
e
r
s
    R.I.T. - - Effective: 9/01/2008   18



a
n
d

a
p
p
l
i
c
a
t
i
o
n
s
’

v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
.

(
4
0
5
5
-
7
8
0

C
o
m
p
u
t
e
r

S
y
s
t
e
m

S
               R.I.T. - - Effective: 9/01/2008                                                                                                 19



e
c
u
r
i
t
y

o
r

e
q
u
i
v
a
l
e
n
t
)

C
l
a
s
s

4
,

L
a
b

0
,

C
r
e
d
i
t

4
                                   Worksheet for M.S. in Computer Security and Information Assurance

                                                     Rochester Institute of Technology
                                      Department of Networking, Security, and Systems Administration
                      This worksheet is a tool for keeping you on track for graduation. Please keep in mind that this is unofficial.


Name:                                                                         Student #:
Address:                                                                      Phone (H):
                                                                              Phone (W):
                                                                              Email:


Entry Term:                                                    Status:                  (FT/PT)
Prerequisites (Bridge Program)                                               Term (or waived)                                          Grade
                R.I.T. - - Effective: 9/01/2008                                                                            20




1016-281 Calculus I
1016-282 Calculus II
1016-265 Discrete Math I
4002-716 C++ for System Administration,
or 4003-334 Computer Science 4,
or 4005-710 Programming Language Theory
4003-713 Operating Systems,
or 4003-440 Operating Systems I
4010-361 Software Engineering
4055-746 Telecommunications Network Protocols
4055-761 Principles of System Administration,
or 4050-402 OS Scripting
                                                   Program of Study (48 credit hours)
Core courses (32 Credits)                                    Quarter                Credits             Grade   Comments
0110-745 Ethics in Technology
                                                                                         4
4005-774 Secure Database Systems
                                                                                         4
4005-705 Cryptography I
                                                                                         4
4010-748 Secure Software Engineering:
Requirements and Design                                                                  4
4055-755 Secure Wireless Networks
                                                                                         4
4055-780 Computer System Security
                                                                                         4
4055-726 Research Methods in NSSA
                                                                                         4
4055-896 Proposal Development
                                                                                         1
4055-897 Thesis
                                                                                         3




Elective courses (16 Credits)                                Quarter                Credits             Grade   Comments
4002-876 Secure e-Commerce                                                               4
4005-706 Cryptography II                                                                 4
4005-749 Topics in Data Comm.                                                            4
4005-800 Theory of Computer Algorithms                                                   4
4055-760 Computer Viruses and Malicious Software                                         4
4055-841 Advanced Forensics                                                              4
4055-882 Enterprise Security                                                             4
4055-886 Security audits of Web Servers and
Applications                                                                             4




Approved by:                                                                            Date:   /   /
R.I.T. - - Effective: 9/01/2008                                                           21




Thesis Completion Procedure
Because this program is a partnership among the departments of the Golisano College,
any of the thesis courses of the departments which offer a thesis may be taken. The
policies and procedures for each department vary and should be consulted. Your thesis
advisor should be able to help you with this. The discussion below is specific to the
Department of Networking, Security, and Systems Administration. However, much of it is
pertinent to all departments.

The thesis is the culmination of your studies. As such, it should demonstrate your ability
as an independent thinker and student. It is intended to demonstrate as well the
inquisitiveness of your mind and your approach to following such inquiries. In short, it
proves your ability as a scholar.

The thesis begins with a topic for exploration. The best topic is one in which you are
interested in and which you choose for yourself. Guidance may be sought from any and
all of the faculty in the program. As you discuss your ideas with faculty members, you
should be seeking a thesis advisor who will guide you throughout the effort.

Once a topic is chosen (or at least roughly outlined) the student begins a proposal. A
proposal may be of any length, usually from 5 to 15 pages in length. Shorter proposals
are possible, as are longer ones. The actual length and format will be decided upon in
concert with the student's thesis advisor and committee. As the proposal grows, your
thesis advisor may help you recruit other committee members. Three faculty members
are required for a thesis committee.

When the committee is defined, and the proposal is complete, attach a thesis proposal
approval form (below) to the front and submit to Ms. Betty Hillman (in the departmental
office). At this point, we will register you for the thesis credits.

Now comes the hard part. You must work to complete the work detailed in the proposal.
Your thesis advisor and committee are resources you may use as you work through your
topic. The primary deliverable is the thesis report itself. A typical thesis runs from 75 to
125 pages in length. Shorter theses are possible, as are longer ones. The length will be
determined by the nature of the work and the demands of the committee.

When you have a complete, or nearly complete, draft of the thesis, submit it to your
committee for review. They will often suggest changes, ranging from simple grammatical
corrections, to additional sections, to total rewrites, to additional research. Their
demands must be met for you to complete your thesis. You must also use the thesis title
page form (below) as the title page for your thesis.

Upon approval (or tentative approval) by the committee, your thesis advisor will allow
you to defend. The advisor must notify the office that the defense is authorized. You
must submit an abstract of your thesis (1-2 paragraphs) to Ms. Betty Hillman, in time for
it to be posted for at least two class days prior to the defense date. Please complete the
thesis defense form (below).

When you have successfully defended your thesis and met all the requirements of the
committee for the thesis report, you should follow the steps on the next page:
R.I.T. - - Effective: 9/01/2008                                                         22


                      Steps to follow after you have successfully Defended your Thesis:

     1. Include the thesis title page form with your thesis (below).
         (This will be page 1 of your Thesis)      Visit: http://nssa.rit.edu/?q=node/35
     2. Get a Thesis Approval form signed by the committee (below).
        (This will be page 2 of your Thesis)       Visit: http://nssa.rit.edu/?q=node/35
     3. Sign a Thesis Reproduction Permission form for the library (below).
        (This will be page 3 of your Thesis)      Visit: http://nssa.rit.edu/?q=node/35
     4. Have one of your committee members send Betty Hillman (NSSA Office) a copy of your thesis via
        email or hard copy. (elizabeth.hillman@rit.edu or 70-2149)
     5. Obtain your Paid Receipt for binding copies:
         Go to the Bursar’s office (Eastman Building 1st floor, Room 1138, 585-475-6186)
         Pay for the thesis binding fee for –
             Four copies for the NSSA Committee
             Number of copies you would like for yourself
        You are not responsible for paying for the binding fee for the RIT Archives copy
        Current binding fee for academic year 08-09 is $13.00 per copy
     6. Publish your Thesis in ProQuest/UMI: (required as of March 1, 2008)
        Please refer to the Proquest/UMI thesis submission website at
        http://library.rit.edu/services/graduate-student-support.html or contact Nick Paulus at
        njpwml@rit.edu or 585-475-7934.
        There is a charge of $55 for archiving a thesis for 08-09 academic year.
         Please obtain a receipt
     7. See Betty Hillman (call 475-2700 or stop by the student services off. 70-2145 to make an
        appointment):
         Bring your signed Thesis approval form and signed Thesis Reproduction Permission form.
         Bring your paid receipt (one pink, one white) for the binding copies.
         Bring your paid receipt for your archive (Proquest) expense.
         Give Betty your request on the total number of copies you need bounded – the NSSA office will
            make black/white copies for you (unless they are in color and you prefer to make them
            yourself).
        (This number should include one for the RIT Archives, four for the NSSA committee, and your
        personal request)
         Optional: Slides are bound with the thesis. All slides must be placed in a slide preserver sheet
            (provided by student).
         Give me your contact information so I can let you know when I have your bounded Thesis.
     8. NSSA to Drop off all copies at RIT Wallace Library: (contact for binding is Gina Bush 585-475-7648)
            Publishing & Scholarship Support Center, 1st Floor Wallace Library (585-475-7713)
             Delivery will be requested to the NSSA Office, 70-2149 attn: Betty Hillman (5-4881,
                elizabeth.hillman@rit.edu 70-2149)
     9. Binding Process:
             Takes two-four weeks for binding
             Shipments of your thesis are sent and received ONLY on alternate Thursdays (585-475-7713)
             The NSSA office will be notified when they are received
             RIT Archives copy will be cataloged in Einstein (RIT Libraries Catalog), WorldCat, & shelved in
                RIT Archives
R.I.T. - - Effective: 9/01/2008                                      23




Forms


Various forms used in completing a thesis are followed.



If you wish to access the forms via the NSSA website, the link is:

http://nssa.rit.edu/?q=node/35
R.I.T. - - Effective: 9/01/2008                                    24




                      Rochester Institute of Technology
                        B. Thomas Golisano College
                                      of
                     Computing and Information Sciences

                          Master of Science in
               Computer Security and Information Assurance

                       ~ Thesis Proposal Approval Form ~


Student Name:

Thesis Title:



                                  ~ MS Thesis Committee ~

                 Name                       Signature       Date



Chair




Committee Member




Committee Member
R.I.T. - - Effective: 9/01/2008                                            25




                                  [insert title here]




                                         By




                             [insert author’s name here]




     Thesis submitted in partial fulfillment of the requirements for the
                    degree of Master of Science in
             Computer Security and Information Assurance

                         Rochester Institute of Technology

                        B. Thomas Golisano College
                                     of
                     Computing and Information Sciences
R.I.T. - - Effective: 9/01/2008                                             26




       [insert date here]




                              Rochester Institute of Technology

                              B. Thomas Golisano College
                                           of
                           Computing and Information Sciences

                            Master of Science in
                 Computer Security and Information Assurance

                                     Thesis Approval Form


Student Name:                     _______________________________________


Thesis Title:                     _______________________________________


                                        Thesis Committee


                 Name                         Signature           Date



Chair



Committee Member



Committee MemberThesis                     Reproduction Permission Form
R.I.T. - - Effective: 9/01/2008                                                 27




                        Rochester Institute of Technology

                       B. Thomas Golisano College
                                    of
                    Computing and Information Sciences

                    Master of Science in
         Computer Security and Information Assurance




                                   [insert title here]




I, [insert author‟s name here], hereby grant permission to the Wallace Library of
the Rochester Institute of Technology to reproduce my thesis in whole or in part.
Any reproduction must
not be for commercial use
or profit.




Date: ___________
       Signature of
Author: __________________________




                                  Master of Science in
R.I.T. - - Effective: 9/01/2008                                                          28




           Computer Security and Information Assurance

                                      ~ Thesis Defense ~

                                  [insert author’s name here]

                                          will defend

                                       [insert title here]


   Abstract: (put a brief 1-2 paragraph abstract of your thesis here)




                                        Defense Date:
                                       Defense Time:
                                      Defense Location:


                              Rochester Institute of Technology

                              B. Thomas Golisano College
                                           of
                           Computing and Information Sciences

Frequently Asked Questions

     1. Is there a scholarship available?
        All full-time and some part-time students receive a scholarship of up to 30% of
        their tuition. Once assigned, this scholarship is for three quarters of support and
R.I.T. - - Effective: 9/01/2008                                                             29



          will be in effect as long as the student remains in good standing (attains a GPA of
          3.0 or better).

     2. What if my studies exceed three quarters?
        Scholarships may be extended. Requests for extension must be made, in writing,
        using the Scholarship Extension Request form (see departmental office) at least
        one quarter before the extension is required.

     3. Does scholarship cover summer term courses?
        Normally not. However, upon request the Graduate Studies Coordinator can
        extend a scholarship to cover summer term courses.

     4. Are there assistantships available?
        The department offers GAs (graduate assistantships) yearly. To apply, you must
        fill     out     and        submit       an       application     (available       at:
        http://www.nssa.rit.edu/pagefiles/gradAssistApp.pdf) to the Graduate Studies
        Coordinator no later than March 15 of the year preceeding the year you wish the
        assistantship to start in. Assistantships are for three quarters and all begin in the
        fall term.

     5. May I do a Co-op?
        Graduate co-op is available. It is optional and you may do at most two co-op
        quarters. You must ensure that your job meets the requirements for co-op before
        beginning work. See the representatives from Career Services and Cooperative
        Education for assistance with this.

     6. How do I get ideas for my thesis and help getting started?
        You can always seek the help of a faculty member with whom you have a good
        relationship. Alternatively, you may take the course 4055-896 Proposal
        Development. If you take this approach, your thesis requirement is reduced to 3
        credits. If you do not take Proposal Development, you must complete a 4 credit
        thesis.

     7. I am an international student. Are there special rules I should know about?
          Yes ... international students must take at least 8 credits per term on campus.
          This can be a problem with courses designed for online students, as some of
          those in this program are. To accommodate this need, we offer most of our
          online courses in two formats. The first is a totally online format which does not
          count toward the 8 credits of on campus coursework. These courses are
          designated with a section number of 90.

          The second format is a blended format. These courses require the same work as
          a totally online course, but bear an additional requirement of at least one meeting
          per week, on campus, with an instructor. These courses do count toward the 8
          credits of on campus coursework. These courses are designated with a section
          number of 39.

     8. May I take other courses as electives, in place of those indicated on the
          worksheet?
R.I.T. - - Effective: 9/01/2008                                                 30



          Yes, you may. However, they must be pre-approved by the Graduate Studies
          Coordinator.

								
To top