|
Nov 24, 2024
|
|
|
|
CS 4920 - Information Security3 lecture hours 0 lab hours 3 credits Course Description This course provides a survey of computer security, consisting of the business case for security, principles of security, classes of vulnerabilities (e.g., buffer overrun), and the principles of cryptography. Cryptography topics are covered in depth, including secret and public key methods, stream ciphers, and related tools and standards such as Kerberos and PGP. (prereq: CE 2801 or CS 2711 or EE 2905 or EE 2931 ) Course Learning Outcomes Upon successful completion of this course, the student will be able to:
- Discuss the business case and the need for an increased focus on computer security, including types of vulnerabilities (social engineering, insecure libraries, etc.) and how current vulnerabilities are disseminated by the software community
- Analyze computing systems with an awareness of various timely legal issues related to security and privacy
- Choose appropriate security implementation techniques based on secret and public key cryptography, the use of hashing, and other cryptographic principles
- Appraise competing tools for common security practices, such as public key encryption, firewalling, and securing network traffic
Prerequisites by Topic
- Set algebra
- High-level language/assembly relationship
- OS and system API based design
Course Topics
- Introduction and context
- Cryptography
- Authentication
- Guest Speakers
- Standards
- Tools overview
- x86 stack overruns in C
Coordinator Michael Vieau
Add to Portfolio (opens a new window)
|
|