|
Courses with significant overlap with this course: Semester of last offering: Date of approval: dd-mmm-yyyy |
|||||
Prerequisites: Course Contents Introduction: need and basic goals for computer security, security threats etc. Cryptographic building blocks: Symmetric and asymmetric key cryptography, cryptographic hash functions, digital signature schemes etc., with representative applications for each. Operating System Security: Low level protection mechanisms, access control: models for access control, some confidentiality, integrity, and hybrid models of access control such as Bell La Padula, Biba, Chinese Wall etc., discretionary v/s mandatory access control. Case studies: Java access control policy specifications, SE Linux security model and implementation. Program flaws: Bugs which have security implications such as buffer overflows, race conditions etc. Malicious code: Viruses, worms, Trojan horses; how they work and how to defend against them. Network Security: problems in network security; kinds of attacks, PKI, key exchange protocols, example protocols such as PGP, Kerberos, IPSEC/VPN,SSL, S/MIME etc. Protocol vulnerabilities: examples of protocol vulnerabilities such as in TCP/IP, denial of service attacks etc. Tools for network security such as firewalls and intrusion detection systems. Topics
Instructor(s):
Number of sections: Tutors for each section: Schedule for Lectures: Schedule for Tutorial: Schedule for Labs:
|