Basic information security concepts; elementary cryptography; program security (malicious code); protection in general purpose operating security, designing trusted operating systems; database security; and network security. Specific topics may include: security threats, vulnerabilities and countermeasures; security objectives and techniques; risk analysis; Trojan horses, viruses, and worms; symmetric key cryptography, public key cryptography, and cryptanalysis; access control, pass-word-based security, authentication and authorization; ACLs and capabilities; multilevel and multilateral security; covert channels and inference control; BLP and Biba’s models; 0perating system security; network attacks; firewalls, and intrusion detection systems.

Launch Course