VIEWS: 9 PAGES: 31 POSTED ON: 8/10/2011
Master of Science in Computer Security and Information Assurance For more information contact: Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Department of Networking, Security, and Systems Administration 152 Lomb Memorial Drive Building 70 – 2145 Rochester, New York 14623 (585) 475-2700 (voice) (585) 475-6584 (fax) R.I.T. - - Effective: 9/01/2008 1 Table of Contents Course plan for M.S. in Computer Security and Information Assurance……3 Entrance Requirements ...................................................................................... 4 Cost of Program .................................................................................................. 6 Financial Aid........................................................................................................ 6 Information .......................................................................................................... 7 Core Course Descriptions .................................................................................. 8 Elective Course Descriptions ............................................................................ 8 Worksheet ......................................................................................................... 10 Thesis Completion Procedures ....................................................................... 21 Forms ................................................................................................................. 23 Frequently Asked Questions ........................................................................... 19 ROCHESTER INSTITUTE OF TECHNOLOGY B. Thomas Golisano College of Computing and Information Sciences Master of Science Computer Security and Information Assurance Introduction The Masters Degree in Computer Security and Information Assurance (MS/CSIA) program at RIT consists of a core curriculum, electives, and a capstone thesis. The core provides students with a solid background in the theoretical principles underlying computer security and information assurance, which ensures that graduates acquire the intellectual tools necessary to keep up-to-date in this rapidly evolving discipline. The electives provide students with the opportunity to obtain depth in computer security and information assurance in areas of interest to them. The electives add the necessary knowledge required of our graduates by industry. This combination prepares our graduates to become leaders in the computer security and information assurance area. This will also prepare the graduates for academic or research careers in this area as well as further academic study. The advanced electives provide students with the ability to choose their area of expertise in software engineering, computer science, or networking and systems administration. The program is designed for students who have an undergraduate major or minor in computer science as well as those who have a strong background in a field in which computers are applied, such as Engineering, Science, Math or Business. In some cases students will be required to complete certain bridge courses to ensure them meeting the prerequisites of the program. This degree program is a cooperative program involving four departments in the Golisano College: The Department of Computer Science R.I.T. - - Effective: 9/01/2008 2 The Department of Information Technology The Department of Networking, Security, and Systems Administration The Department of Software Engineering The curriculum is designed, maintained, and controlled by a committee with representatives from each of the above departments. The program is administered by the Department of Networking, Security, and Systems Administration. R.I.T. - - Effective: 9/01/2008 3 BRIDGE (Prerequisites) 1016-281 4002-716 4055-746 Calculus I C++ Programming Telecom Network Workshop Protocols 1016-282 4003-713 4055-761 Calculus II Operating Systems Principles of System Administration 1016-265 4010-361 Discrete Math Software Engineering CORE 0110-745 4010-748 4055-726 Ethics in Technology Secure Software Research Methods Engineering R&D 4005-705 4055-755 4055-780 Cryptography I Secure Wireless Networks Computer System Security 4005-774 4055-896 Proposal Dev (1) Secure Databases 4055-897 MS Thesis (3) ELECTIVES (choose 16 credits) 4002-876 4005-749 4055-882 Secure E-Commerce Topics in Data Comm. Enterprise Security 4055-886 4005-800 4055-760 Security Audits of Web Theory of Computer Computer Viruses and Servers and Applications Algorithms Malicious Software 4055-841 4005-706 Advanced Forensics Cryptography II Course plan for M.S. in Computer Security and Information Assurance (Details below) R.I.T. - - Effective: 9/01/2008 4 Entrance Requirements Degree applicants should minimally have a baccalaureate or equivalent degree from an accredited institution of higher education and a minimum cumulative grade-point average equivalent to 3.0 out of 4.0 („B‟ average). International students must also have a 3.0 out of 4.0 from an accredited university using the US system of grading, or a first class degree from an accredited university using the British system of grading. Additionally, applicants with degrees from foreign universities must submit Graduate Record Examination (GRE) scores. The GRE may also be required for those applicants requesting consideration whose undergraduate grade-point average is less than 3.0/4.0. Applicants whose native language is other than English must take and submit the TOEFL examination. A minimum score of 570 (paper-based exam), 230 (computer- based exam) or 80 (internet-based exam) is required. Applicants with a lower TOEFL may be admitted conditionally. However, they will be required to take a prescribed program in English along with a reduced program course load until the required English level is achieved. Information about the GRE and the TOEFL examinations is available at www.ets.org. RIT’s reporting number for ETS’s GRE and TOEFL examinations is 2760. Application & Deadlines The application process typically takes four to six weeks after the Office of Graduate Enrollment Services has received a complete application. However, international applications may take longer due to slower physical mail. The Graduate Program Coordinator in the Department of Networking, Security, and Systems Administration only evaluates applications after all of the information has been submitted and verified by a counselor in RIT‟s Office of Graduate Enrollment Services. Students can be admitted at various times during the year. However, acceptance into the program does not guarantee availability of classes. As the start of the quarter approaches, many classes become full. Students, who apply just before the start of a quarter, may need to wait until the following quarter before starting their course work. The application deadline schedule is shown below: Quarter Typical Starting Domestic International Date of Quarter Application Residents Deadline Application Deadline Fall September 1 August 10 July 1 Winter Not Permitted Not Permitted Not Permitted Spring March 1 February 1 January 1 Summer Not Permitted Not Permitted Not Permitted R.I.T. - - Effective: 9/01/2008 5 All applicants are required to submit the following: An electronic or paper application. A well-written statement of purpose that discusses your background and the personal goals that this degree will support. Application fee. Valid transcripts from all universities listed on the application. Two recommendations from educational and/or professional sources. An electronic graduate application is available at the URL http://www.rit.edu/emcs/ptgrad/grad_app.html. (Note: there is an underscore (_) between the „d‟ and the „a‟ in “grad_app”.) This web site can also be reached from the “Admissions” link on the RIT home page, at the URL http://www.rit.edu/. Requests for information can be made from this web site. We may be able to start you in coursework while your application is being processed. Please feel free to contact the IT Graduate Coordinator at nssaGradPgm@rit.edu about this option. Prerequisites Applicants wishing to enter this master‟s program are expected to have the equivalent of an undergraduate degree in computer networking and/or systems administration. Other degree programs may also suffice (e.g., Computer Science, Software Engineering, Computer Engineering) depending on the student‟s course work and/or work experience. The specific prerequisites are: Mathematical maturity, including calculus and discrete mathematics. A knowledge of basic networking, including: Ethernet, TCP/IP, routing and switching, cable construction, and basic LAN design and construction principles. Knowledge of basic networking infrastructure services, including DHCP, DNS, and other discovery and name resolution protocols. Knowledge of basic system services and system administration functions, including scripting for Unix, user administration, networked file systems, web services, networked information systems (such as NIS), and networked security and permission issues. Knowledge of programming in C or Java. Knowledge of computer operating systems. Knowledge of basic software engineering principles. Students without this background, but with a strong background in computing (including programming) may pursue completion of these prerequisite via a program of courses offered by RIT or another institution to bridge them into the M.S. degree program. . R.I.T. - - Effective: 9/01/2008 6 The Bridge Program Ideally, students will have the required coursework or documented experience before matriculating in the M.S. degree program. Students, whose undergraduate preparation or industrial/work experience does not satisfy the above requirements can make up this deficiency through study, taking one or more of courses as prescribed by the Graduate Program Coordinator. This coursework may be done at any accredited college or university that is convenient. Students are expected to achieve a 3.0 („B‟ grade) or better average in course work done as part of the bridge program. Bridge program courses are not part of the 48- quarter credit hours required for the master‟s degree. No bridge courses may be applied toward degree requirements. Grades for bridge courses are not included in a student‟s graduate grade-point average, if taken before matriculation. However, grades for bridge courses taken after matriculation are included in student‟s graduate grade-point average. Students who have been admitted to the program before completing prerequisite requirements must complete bridge coursework within the first two (2) quarters of matriculation. Prior approval of the Graduate Program Coordinator is required before any other courses in the program may be taken. To meet individual needs, a bridge program can be designed differently from that described above. Other courses can be substituted, or courses at other colleges can be applied. For example applicants studying at a distance may take equivalent courses from their local community colleges or universities. However, such programs must be approved in advance. Contact the Graduate Program Coordinator for approval prior to beginning bridge work. The Curriculum This program of study consists of thirteen courses (48 quarter-credit hours) which include the core coursework (28 credits), sixteen (16) credits of electives from a prescribed set of courses, and the thesis capstone experience (4) credits. Cost of Program For academic year 2008-2009, the cost of graduate study is $800/credit or $3,200 for each 4-credit course in the N&SA program of study. Full-time students are charged $9,497 per quarter ($28,491 per year). Financial Aid The Department of Networking, Security and Systems Administration can offer a small Merit Scholarship to qualified students who are not receiving financial support from other sources, such as from an employer, etc. The maximum award is currently 30% of the cost of tuition per quarter. The merit scholarship is awarded initially for one (1) academic year (three quarters) from the quarter in which the student is admitted. The initial award usually does not cover the fourth quarter (typically summer) in the first year of study. For the fourth quarter and each year following the initial award, the student must submit an application to request continuation of the scholarship. The award will, in general, be extended if the student maintains at least a 3.0 GPA, which is the minimum required to graduate from a MS program at RIT. R.I.T. - - Effective: 9/01/2008 7 Information Additional information may be obtained by contacting: US Mail: Graduate Program Coordinator Department of Networking, Security and Systems Administration Rochester Institute of Technology 152 Lomb Memorial Drive Rochester, New York 14623-5608 E-mail: nssaGradPgm@rit.edu Telephone: (585) 475-2700 (v/tty) FAX: (585) 475-6584 R.I.T. - - Effective: 9/01/2008 8 Computer Security and Information Assurance Course Descriptions Core Course Descriptions 0110-745 Legal and Ethical Issues in Technology Intensive Environments The course confronts graduate students with a wide variety of legal and ethical issues in organizational environments that are technologically intensive, such as information technology and the life sciences. Impacts of intellectual property legislation and legal cases in national and international venues are investigated. Legal and social issues involving individual privacy are argued. This exposure to legal and ethical dilemmas is an important tool as the graduates encounter such situation throughout their careers. Coupled with technical proficiency the ability to deal with legal and ethical issues shapes professional successes and failures. Not available to students who have completed 0102-785. Credit 4 4005-705 Cryptography The course is devoted to the review of basic cryptographic algorithms, their implementation and usage. Classical encryption techniques and those of Rivest-Shamir-Adleman and EL Gamal will be seen in depth, and an overview of several others will be presented. This course also presents authentication schemes and interactive proof protocols. Students will write a term paper, either theoretical based on literature or reporting a student’s own implementation or experiments with a chosen cryptographic scheme. Depending on the size of the group, some or all students will give a presentation to the class. (4003-263 or 4003-334; 1016-265; set by instructor) Class 4, Credit 4 4005-774 Secure Database Systems This course explores policies, methods and mechanisms for protecting enterprise data. Topics include data reliability, integrity, and confidentiality; discretionary and mandatory access controls; secure database architectures; secure transaction processing; information flow, aggregations, and inference controls, and auditing; security models for relational, object-oriented, statistical, XML, and real time database systems. Programming projects are required. (4002-484, or 4003-485, or 4010-443 or equivalent) Class 4, Credit 4 4010-748 Secure Software Engineering: Requirements and Design Overview of the secure software issues and principles that should be addressed during requirements engineering and design. Topics include: risk management and software requirement specification. Designing for security and security in implementation. (4010-361) Credit 4, Class 0, Lab 0 4055-726 Research Methods in NSSA This seminar introduces students to the MS in networking, and system administration by providing an opportunity to meet the faculty involved in the program and their fellow students. Students will learn about current areas of research in networking, security, and system administration and the areas of research interest of the faculty. To encourage students to begin thinking about their final project or thesis, students will develop a research proposal that may serve as the basis for their later thesis proposal. In addition, this course provides an overview of the academic research methodologies used in graduate level work. Topics include: experimental research, correlation, experiment observation, surveys, and case studies. Also included will be document structure, validation, and the process for submission and review to conferences and journals. Class 4, Credit 4 4055-780 Computer System Security This course provides an introduction to computer network security. The areas covered will include the liability, exposure, opportunity, and ability to exploit various weaknesses in a networked computer environment. The forms of the attacks and the detection and defense of the attacks will be discussed. The issues and facilities available to both the intruder and administrator will be examined and evaluated with illustrative laboratory exercises. (4055 761 or equivalent, co requisite: 4055-780 lab) Class 3, Lab 2, Credit 4 4055-755 Secure Wireless Networks This course is designed to provide students with the foundation needed to understand the problems of network security, perform a risk analysis to ascertain the threats and cost of an attack, and design and implement security strategies to effectively build a defense to minimize the effects of these attacks. (4055-746 or equivalent knowledge) Class 4, Credit 4 Elective Course Descriptions R.I.T. - - Effective: 9/01/2008 9 4002-876 Secure eCommerce This course covers the concepts required to implement a secure e commerce site. Topics include the assessment of security in a proposed or an existing site, the implications of decisions impacting security and the implementation considerations needed to establish a secure site. (4002-875) Class 4, Distance Format, Credit 4 4005-706 Cryptography II This course investigates advanced topics in cryptography. Topics include an overview of necessary background in algebra and number theory, private and public key cryptosystems, and basic signature schemes. Additional topics include number theory and basic theory of Galois fields used in cryptography; history of primality algorithms and the polynomial time test of primality; discrete logarithm based cryptosystems including those based on elliptic curves; interactive protocols including the role of zero- knowledge proofs in authentication; construction of untraceable electronic cash on the net; and quantum cryptography. Other topics may include digital watermarking, fingerprinting, and steganography. Programming will be required. (4005-705 Cryptography I or 4003-482 and permission of instructor) 4005-749 Topics in Data Communication Current topics in the field. The format of this course is a combination lecture and seminar. Students may register for this course more than once. Topics covered in the past include: network reliability, special- purpose protocols, error-correcting codes. Programming projects will be required. (Permission of the instructor, completion of the bridge program) Class 1–4, Credit 1–4 APPROVAL REQUIRED 4005-800 Theory of Computer Algorithms This course provides an introduction to the design and analysis of algorithms. It covers a large number of classical algorithms and their complexity and will equip students with the intellectual tools to design, analyze, implement, and evaluate their own algorithms. (1016-265 Discrete Math I, 4003-334-CS 4) Class 4, Credit 4 4055-760 Computer Viruses and Malicious Software This course involves the study of malicious software (Malware) including computer viruses, worms, and Trojan horses. Topics include the various mechanisms used in the construction of malicious software; existing commercial anti-virus software; preventative and reactive means for dealing with malicious software on workstations, servers and in networks; training and education of users; and reliable sources to monitor for alerts as well as the prevention of hoaxes. (4002-716 C++ for Programmers or equivalent) Class 3, Lab 2, Credit 4 4055-841 Advanced Computer Forensics This course provides students with knowledge and understanding of computer forensics. It will also provide a theoretical foundation for the techniques and methods needed for the extraction of information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special needs” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows under multiple file systems. (4002-716 or equivalent and 4055-761 or equivalent) Class 4, Credit 4 4055-882 Enterprise Security This course is designed to provide students with the advanced concepts needed to establish network security strategies to ensure adequate protection for the corporate environment and yet provide accessibility for the corporate community. (4055-761 and (4055-815 or 4055-746).) Class 4, Credit 4 4 0 5 5 - 8 8 6 S R.I.T. - - Effective: 9/01/2008 10 e c u r i t y A u d i t s o f W e b S e r v e r s a n d A p p l i c a t i o n s T h i s c o u r s e w i l R.I.T. - - Effective: 9/01/2008 11 l p r o v i d e s t u d e n t s w i t h a n i n t r o d u c t i o n t o p r o c e s s e s a n d p r o c e R.I.T. - - Effective: 9/01/2008 12 d u r e s f o r p e r f o r m i n g a t e c h n i c a l s e c u r i t y a u d i t i n g o f w e b s e r v R.I.T. - - Effective: 9/01/2008 13 e r s a n d w e b b a s e d a p p l i c a t i o n s . S t u d e n t s w i l l n o t o n l y e x p l o r e R.I.T. - - Effective: 9/01/2008 14 t h e e x i s t i n g X M L / W e b S e r v i c e s t h r e a t s , b u t a l s o l e a r n t o a p p l y R.I.T. - - Effective: 9/01/2008 15 a p p r o p r i a t e a u d i t i n g t o o l s t o i d e n t i f y n e w v u l n e r a b i l i t i e s e x R.I.T. - - Effective: 9/01/2008 16 i s t i n g i n o r s t e m m i n g f r o m w e b s e r v e r s a n d a p p l i c a t i o n s . S t u d e R.I.T. - - Effective: 9/01/2008 17 n t s w i l l w r i t e a n d p r e s e n t t h e i r a u d i t r e p o r t s o n w e b s e r v e r s R.I.T. - - Effective: 9/01/2008 18 a n d a p p l i c a t i o n s ’ v u l n e r a b i l i t i e s . ( 4 0 5 5 - 7 8 0 C o m p u t e r S y s t e m S R.I.T. - - Effective: 9/01/2008 19 e c u r i t y o r e q u i v a l e n t ) C l a s s 4 , L a b 0 , C r e d i t 4 Worksheet for M.S. in Computer Security and Information Assurance Rochester Institute of Technology Department of Networking, Security, and Systems Administration This worksheet is a tool for keeping you on track for graduation. Please keep in mind that this is unofficial. Name: Student #: Address: Phone (H): Phone (W): Email: Entry Term: Status: (FT/PT) Prerequisites (Bridge Program) Term (or waived) Grade R.I.T. - - Effective: 9/01/2008 20 1016-281 Calculus I 1016-282 Calculus II 1016-265 Discrete Math I 4002-716 C++ for System Administration, or 4003-334 Computer Science 4, or 4005-710 Programming Language Theory 4003-713 Operating Systems, or 4003-440 Operating Systems I 4010-361 Software Engineering 4055-746 Telecommunications Network Protocols 4055-761 Principles of System Administration, or 4050-402 OS Scripting Program of Study (48 credit hours) Core courses (32 Credits) Quarter Credits Grade Comments 0110-745 Ethics in Technology 4 4005-774 Secure Database Systems 4 4005-705 Cryptography I 4 4010-748 Secure Software Engineering: Requirements and Design 4 4055-755 Secure Wireless Networks 4 4055-780 Computer System Security 4 4055-726 Research Methods in NSSA 4 4055-896 Proposal Development 1 4055-897 Thesis 3 Elective courses (16 Credits) Quarter Credits Grade Comments 4002-876 Secure e-Commerce 4 4005-706 Cryptography II 4 4005-749 Topics in Data Comm. 4 4005-800 Theory of Computer Algorithms 4 4055-760 Computer Viruses and Malicious Software 4 4055-841 Advanced Forensics 4 4055-882 Enterprise Security 4 4055-886 Security audits of Web Servers and Applications 4 Approved by: Date: / / R.I.T. - - Effective: 9/01/2008 21 Thesis Completion Procedure Because this program is a partnership among the departments of the Golisano College, any of the thesis courses of the departments which offer a thesis may be taken. The policies and procedures for each department vary and should be consulted. Your thesis advisor should be able to help you with this. The discussion below is specific to the Department of Networking, Security, and Systems Administration. However, much of it is pertinent to all departments. The thesis is the culmination of your studies. As such, it should demonstrate your ability as an independent thinker and student. It is intended to demonstrate as well the inquisitiveness of your mind and your approach to following such inquiries. In short, it proves your ability as a scholar. The thesis begins with a topic for exploration. The best topic is one in which you are interested in and which you choose for yourself. Guidance may be sought from any and all of the faculty in the program. As you discuss your ideas with faculty members, you should be seeking a thesis advisor who will guide you throughout the effort. Once a topic is chosen (or at least roughly outlined) the student begins a proposal. A proposal may be of any length, usually from 5 to 15 pages in length. Shorter proposals are possible, as are longer ones. The actual length and format will be decided upon in concert with the student's thesis advisor and committee. As the proposal grows, your thesis advisor may help you recruit other committee members. Three faculty members are required for a thesis committee. When the committee is defined, and the proposal is complete, attach a thesis proposal approval form (below) to the front and submit to Ms. Betty Hillman (in the departmental office). At this point, we will register you for the thesis credits. Now comes the hard part. You must work to complete the work detailed in the proposal. Your thesis advisor and committee are resources you may use as you work through your topic. The primary deliverable is the thesis report itself. A typical thesis runs from 75 to 125 pages in length. Shorter theses are possible, as are longer ones. The length will be determined by the nature of the work and the demands of the committee. When you have a complete, or nearly complete, draft of the thesis, submit it to your committee for review. They will often suggest changes, ranging from simple grammatical corrections, to additional sections, to total rewrites, to additional research. Their demands must be met for you to complete your thesis. You must also use the thesis title page form (below) as the title page for your thesis. Upon approval (or tentative approval) by the committee, your thesis advisor will allow you to defend. The advisor must notify the office that the defense is authorized. You must submit an abstract of your thesis (1-2 paragraphs) to Ms. Betty Hillman, in time for it to be posted for at least two class days prior to the defense date. Please complete the thesis defense form (below). When you have successfully defended your thesis and met all the requirements of the committee for the thesis report, you should follow the steps on the next page: R.I.T. - - Effective: 9/01/2008 22 Steps to follow after you have successfully Defended your Thesis: 1. Include the thesis title page form with your thesis (below). (This will be page 1 of your Thesis) Visit: http://nssa.rit.edu/?q=node/35 2. Get a Thesis Approval form signed by the committee (below). (This will be page 2 of your Thesis) Visit: http://nssa.rit.edu/?q=node/35 3. Sign a Thesis Reproduction Permission form for the library (below). (This will be page 3 of your Thesis) Visit: http://nssa.rit.edu/?q=node/35 4. Have one of your committee members send Betty Hillman (NSSA Office) a copy of your thesis via email or hard copy. (email@example.com or 70-2149) 5. Obtain your Paid Receipt for binding copies: Go to the Bursar’s office (Eastman Building 1st floor, Room 1138, 585-475-6186) Pay for the thesis binding fee for – Four copies for the NSSA Committee Number of copies you would like for yourself You are not responsible for paying for the binding fee for the RIT Archives copy Current binding fee for academic year 08-09 is $13.00 per copy 6. Publish your Thesis in ProQuest/UMI: (required as of March 1, 2008) Please refer to the Proquest/UMI thesis submission website at http://library.rit.edu/services/graduate-student-support.html or contact Nick Paulus at firstname.lastname@example.org or 585-475-7934. There is a charge of $55 for archiving a thesis for 08-09 academic year. Please obtain a receipt 7. See Betty Hillman (call 475-2700 or stop by the student services off. 70-2145 to make an appointment): Bring your signed Thesis approval form and signed Thesis Reproduction Permission form. Bring your paid receipt (one pink, one white) for the binding copies. Bring your paid receipt for your archive (Proquest) expense. Give Betty your request on the total number of copies you need bounded – the NSSA office will make black/white copies for you (unless they are in color and you prefer to make them yourself). (This number should include one for the RIT Archives, four for the NSSA committee, and your personal request) Optional: Slides are bound with the thesis. All slides must be placed in a slide preserver sheet (provided by student). Give me your contact information so I can let you know when I have your bounded Thesis. 8. NSSA to Drop off all copies at RIT Wallace Library: (contact for binding is Gina Bush 585-475-7648) Publishing & Scholarship Support Center, 1st Floor Wallace Library (585-475-7713) Delivery will be requested to the NSSA Office, 70-2149 attn: Betty Hillman (5-4881, email@example.com 70-2149) 9. Binding Process: Takes two-four weeks for binding Shipments of your thesis are sent and received ONLY on alternate Thursdays (585-475-7713) The NSSA office will be notified when they are received RIT Archives copy will be cataloged in Einstein (RIT Libraries Catalog), WorldCat, & shelved in RIT Archives R.I.T. - - Effective: 9/01/2008 23 Forms Various forms used in completing a thesis are followed. If you wish to access the forms via the NSSA website, the link is: http://nssa.rit.edu/?q=node/35 R.I.T. - - Effective: 9/01/2008 24 Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Computer Security and Information Assurance ~ Thesis Proposal Approval Form ~ Student Name: Thesis Title: ~ MS Thesis Committee ~ Name Signature Date Chair Committee Member Committee Member R.I.T. - - Effective: 9/01/2008 25 [insert title here] By [insert author’s name here] Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Security and Information Assurance Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences R.I.T. - - Effective: 9/01/2008 26 [insert date here] Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Computer Security and Information Assurance Thesis Approval Form Student Name: _______________________________________ Thesis Title: _______________________________________ Thesis Committee Name Signature Date Chair Committee Member Committee MemberThesis Reproduction Permission Form R.I.T. - - Effective: 9/01/2008 27 Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Computer Security and Information Assurance [insert title here] I, [insert author‟s name here], hereby grant permission to the Wallace Library of the Rochester Institute of Technology to reproduce my thesis in whole or in part. Any reproduction must not be for commercial use or profit. Date: ___________ Signature of Author: __________________________ Master of Science in R.I.T. - - Effective: 9/01/2008 28 Computer Security and Information Assurance ~ Thesis Defense ~ [insert author’s name here] will defend [insert title here] Abstract: (put a brief 1-2 paragraph abstract of your thesis here) Defense Date: Defense Time: Defense Location: Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Frequently Asked Questions 1. Is there a scholarship available? All full-time and some part-time students receive a scholarship of up to 30% of their tuition. Once assigned, this scholarship is for three quarters of support and R.I.T. - - Effective: 9/01/2008 29 will be in effect as long as the student remains in good standing (attains a GPA of 3.0 or better). 2. What if my studies exceed three quarters? Scholarships may be extended. Requests for extension must be made, in writing, using the Scholarship Extension Request form (see departmental office) at least one quarter before the extension is required. 3. Does scholarship cover summer term courses? Normally not. However, upon request the Graduate Studies Coordinator can extend a scholarship to cover summer term courses. 4. Are there assistantships available? The department offers GAs (graduate assistantships) yearly. To apply, you must fill out and submit an application (available at: http://www.nssa.rit.edu/pagefiles/gradAssistApp.pdf) to the Graduate Studies Coordinator no later than March 15 of the year preceeding the year you wish the assistantship to start in. Assistantships are for three quarters and all begin in the fall term. 5. May I do a Co-op? Graduate co-op is available. It is optional and you may do at most two co-op quarters. You must ensure that your job meets the requirements for co-op before beginning work. See the representatives from Career Services and Cooperative Education for assistance with this. 6. How do I get ideas for my thesis and help getting started? You can always seek the help of a faculty member with whom you have a good relationship. Alternatively, you may take the course 4055-896 Proposal Development. If you take this approach, your thesis requirement is reduced to 3 credits. If you do not take Proposal Development, you must complete a 4 credit thesis. 7. I am an international student. Are there special rules I should know about? Yes ... international students must take at least 8 credits per term on campus. This can be a problem with courses designed for online students, as some of those in this program are. To accommodate this need, we offer most of our online courses in two formats. The first is a totally online format which does not count toward the 8 credits of on campus coursework. These courses are designated with a section number of 90. The second format is a blended format. These courses require the same work as a totally online course, but bear an additional requirement of at least one meeting per week, on campus, with an instructor. These courses do count toward the 8 credits of on campus coursework. These courses are designated with a section number of 39. 8. May I take other courses as electives, in place of those indicated on the worksheet? R.I.T. - - Effective: 9/01/2008 30 Yes, you may. However, they must be pre-approved by the Graduate Studies Coordinator.
"Master of Science in"