Computer Systems Security

CS628A

 

3-0-0-9

 

Courses with significant overlap with this course:

Semester of last offering:

Date of approval: dd-mmm-yyyy

Prerequisites:  

Course Contents

Introduction: need and basic goals for computer security, security threats etc. Cryptographic building blocks: Symmetric and asymmetric key cryptography, cryptographic hash functions, digital signature schemes etc., with representative applications for each. Operating System Security: Low level protection mechanisms, access control: models for access control, some confidentiality, integrity, and hybrid models of access control such as Bell La Padula, Biba, Chinese Wall etc., discretionary v/s mandatory access control. Case studies: Java access control policy specifications, SE Linux security model and implementation. Program flaws: Bugs which have security implications such as buffer overflows, race conditions etc. Malicious code: Viruses, worms, Trojan horses; how they work and how to defend against them. Network Security: problems in network security; kinds of attacks, PKI, key exchange protocols, example protocols such as PGP, Kerberos, IPSEC/VPN,SSL, S/MIME etc. Protocol vulnerabilities: examples of protocol vulnerabilities such as in TCP/IP, denial of service attacks etc. Tools for network security such as firewalls and intrusion detection systems. 

Topics  

Instructor(s):
Number of sections:

Tutors for each section:

Schedule for Lectures:

Schedule for Tutorial:

Schedule for Labs:

 
 
 

 

 
Birds at IIT Kanpur
Information for School Children
IITK Radio
Counseling Service