CS433- Computer Security
Course Objectives:
Having successfully completed this course, the student will be able to:
This course offers a broad overview of various aspects of security in computer systems. A number of possible vulnerabilities are discussed along with countermeasures. Systematic approaches for building secure computer systems are also described.
Topics Covered:
Lectures:
1. Introduction to computer security
2. Cryptography
3. Security models
4. Database security
5. Network security
6. Program security
7. Operating system security
8. Security operations
9. Human factors
10. Computer crime
11. Privacy issues
12. Legal and ethical issues
Laboratories:
[1] R. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems", 2nd ed., Wiley, 2008 (or later ed.)
[2] C. Pfleeger and S. Pfleeger, "Security in Computing", 4th ed., Prentice Hall, 2006. (or later ed.)
Slides:
Course Objectives:
Having successfully completed this course, the student will be able to:
- Develop an appreciation of problems related to computer security.
- Improve the awareness of the security issue in computer systems.
- Distinguish between fundamental techniques required for building secure systems.
- Evaluate the level of security in a computer system.
This course offers a broad overview of various aspects of security in computer systems. A number of possible vulnerabilities are discussed along with countermeasures. Systematic approaches for building secure computer systems are also described.
Topics Covered:
Lectures:
1. Introduction to computer security
2. Cryptography
3. Security models
4. Database security
5. Network security
6. Program security
7. Operating system security
8. Security operations
9. Human factors
10. Computer crime
11. Privacy issues
12. Legal and ethical issues
Laboratories:
- Identify diverse types of malicious code detection scanners and distinguish between them.
- Choose the appropriate Antivirus and spyware tools, install them on a computer, and identify their features.
- Practice on encryption and decryption data files/folders.
- Write programs in a selected programming language for simple cryptosystems.
- Practice on the use of encryption utilities in the programming languages.
- Use and employee hash functions to maintain data integrity in a database.
- Student presentations on important topics/articles
[1] R. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems", 2nd ed., Wiley, 2008 (or later ed.)
[2] C. Pfleeger and S. Pfleeger, "Security in Computing", 4th ed., Prentice Hall, 2006. (or later ed.)
Slides:
Lecture 1: Introduction [PPT]
Lecture 2: Cryptography[PPT]
Lecture 3: Access Control Systems[PPT]
Lecture 4: Database Security[PPT]
Lecture 5: Network Security Attacks [PPT]
Lecture 6: Network Security Technologies [PPT]
Lecture 7: Software Security [PPT]
Lecture 8: Operating System Security [PPT]
Lecture 6: Network Security Technologies [PPT]
Lecture 7: Software Security [PPT]
Lecture 8: Operating System Security [PPT]
No comments:
Post a Comment