40 likes | 206 Views
Computer Science 427/527 - Syllabus Objective: Overview of policy, threats, requirements, technology, algorithms, standards, and applications used for computer & network security. Introduces computer security concepts, secret and public key
E N D
Computer Science 427/527 - Syllabus Objective: Overview of policy, threats, requirements, technology, algorithms, standards, and applications used for computer & network security. Introduces computer security concepts, secret and public key cryptography, public key infrastructure, and other security mechanisms as well as threat, vulnerability, and protection mechanisms. High Level View – Theory & Practice: Secrecy, Integrity, Availability of Systems & Information. How bad guys get in and how we keep them out. Syllabus
Syllabus, Page 2 Topics covered include: Risk analysis (the threat, our vulnerability, how to mitigate it) Policy and policy issues (what is this & why do we need it?) Elements of technical security (secrecy, integrity, availability) Secrecy, confidentiality, privacy (can I keep it from prying eyes?) Integrity (has anything changed?) Availability (is the system/information there when I need it?) Authentication (are you who you say you are?) Non-repudiation (can I prove you did it?) Auditing (can I record what was done, when, and who did it?) Syllabus
Syllabus, Page 3 The Theory Topics – The Fundamentals. Cryptology & classical cryptography Modern cryptography - secret key systems Modern cryptography - public key systems Public key infrastructure Number theory Message authentication & hash functions Hash & MAC algorithms Digital signatures & authentication protocols Syllabus
Syllabus, Page 4 The Practical Topics – The Real World Operating system & applications security Internet security Wireless network security Security flaws & vulnerabilities Malicious software (viruses, trojans, worms) Perimeter protection (firewalls) Intrusions prevention & detection Security architecture Forensics Standards Syllabus