Introduction to Computer Security
Security risks, threats, and vulnerabilities from technical perspectives; confidentiality, integrity, and hybrid policies; cryptography, access control, assurance, accountability, and engineering of secure systems.
- Key principles of conventional computer security
- Principles and practices of developing secure software systems
- Articulate the principles of computer and information security,
- Describe similarities and differences among various symmetric and public key
- cryptographic techniques,
- Explain discretionary owner-based, mandatory lattice-based, and role-based access
- control models,
- Describe main types of security policies,
- Articulate the principles of security design,
- Explain methods of security assurance,
- Articulate the defense methods against malicious logic.
William Stallings, Computer Security: Principles and Practice, 4th Edition
Mark Stamp, Information Security : Principles and Practice, Wiley-Interscience, 2005.
|CPEN 331 – Operating and File Systems|
|CPEN 333 – System Software Engineering|
|CPSC 313 – Computer Hardware and Operating Systems|