|
This
course focuses on the basic principles of
information security and
cryptography and how they are used in modern computer and
communication systems.
Topics
include:
 |
Introduction to information security |
 |
security
models, |
 |
access
control policies, |
 |
risk
analysis |
 |
cryptographic
algorithms, public-key cryptography |
 |
Identification authentication (smart cards, biometrics, etc) |
 |
Public
Key Infrastructure, |
 |
secure
operating systems, |
 |
secure
database systems, |
 |
secure
electronic commerce |
 |
web
security |
 |
privacy
and anonymity on web |
 |
legal
framework on information security |
slides of the
syllabus
TEXTBOOKS
 |
Matthew
Bishop, Computer Security: Art and Science
Addison-Wesley,
2003. ISBN 0-201-44099-7 |
Other Reference
Material
-
Security in Computing, 2nd Edition, Charles P. Pfleeger, Prentice Hall
PREREQUISITES
Although it is
currently indicated that there are no pre-requisites for this course, to
benefit the most from the course, students taking this course are
expected to have the following background:
 |
Basic knowledge of:
Java programming, operating systems, data structures, database systems
and networks. |
 |
Basic mathematics:
undergraduate mathematics, some knowledge about mathematical logic
|
EVALUATION/GRADING:
OFFICE HOURS:
Friday: 6:00-7:00
pm.
|