Security. Ross Anderson Computer Science Tripos part 2 Cambridge University. Aims. Give you a thorough understanding of information security technology Policy (what should be protected) Mechanisms (cryptography, electrical engineering, …) Attacks (malicious code, protocol failure …)
Computer Science Tripos part 2
By the end of the course, you should be able to tackle an information protection problem by drawing up a threat model, formulating a security policy, and designing specific protection mechanisms to implement the policy.
Security engineering is about building systems to remain dependable in the face of malice, error and mischance. As a discipline, it focuses on the tools, processes and methods needed to design, implement and test complete systems, and to adapt existing systems as their environment evolves.
What’s wrong with this?