1 / 4

Computer Science 427/527 - Syllabus

Computer Science 427/527 - Syllabus Objective: Overview of policy, threats, requirements, technology, algorithms, standards, and applications used for computer & network security. Introduces computer security concepts, secret and public key

noel
Download Presentation

Computer Science 427/527 - Syllabus

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Science 427/527 - Syllabus Objective: Overview of policy, threats, requirements, technology, algorithms, standards, and applications used for computer & network security. Introduces computer security concepts, secret and public key cryptography, public key infrastructure, and other security mechanisms as well as threat, vulnerability, and protection mechanisms. High Level View – Theory & Practice: Secrecy, Integrity, Availability of Systems & Information. How bad guys get in and how we keep them out. Syllabus

  2. Syllabus, Page 2 Topics covered include: Risk analysis (the threat, our vulnerability, how to mitigate it) Policy and policy issues (what is this & why do we need it?) Elements of technical security (secrecy, integrity, availability) Secrecy, confidentiality, privacy (can I keep it from prying eyes?) Integrity (has anything changed?) Availability (is the system/information there when I need it?) Authentication (are you who you say you are?) Non-repudiation (can I prove you did it?) Auditing (can I record what was done, when, and who did it?) Syllabus

  3. Syllabus, Page 3 The Theory Topics – The Fundamentals. Cryptology & classical cryptography Modern cryptography - secret key systems Modern cryptography - public key systems Public key infrastructure Number theory Message authentication & hash functions Hash & MAC algorithms Digital signatures & authentication protocols Syllabus

  4. Syllabus, Page 4 The Practical Topics – The Real World Operating system & applications security Internet security Wireless network security Security flaws & vulnerabilities Malicious software (viruses, trojans, worms) Perimeter protection (firewalls) Intrusions prevention & detection Security architecture Forensics Standards Syllabus

More Related