AT70.13 Computer Security

Introduction, Cryptography, Access Control, Security Protocols, Network Security Practice, System Security, Security Management.CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

Semester:
January/June Intersem

Rationale:
To provide the students with key knowledge about the nature and challenges of computer security, especially the relationship between policy and security, the role and application of cryptography, the mechanisms used to implement policies, the methodologies and technologies for assurance, vulnerability analysis and intrusion detection and building secure systems.

Catalog Description:
Introduction, Cryptography, Access Control, Security Protocols, Network Security Practice, System Security, Security Management.

Credits:
3(3-0)

Prerequisite:
None

Course Outline:
Introduction
Cryptography
  1. Conventional Encryption
  2. Public Key Encryption and Hash Functions
  3. Digital Signature
Access Control
  1. Security Models and Access Policies
  2. Access Control in Operating Systems
  3. Access Control in Distributed System: Credentials and Certificates, Trust Management, Trust Negotiations.
Security Protocols
  1. Key Exchange
  2. Authentication
  3. Authentication and Key Exchange
  4. Electronic Payment Protocols: Nonrepudiation, Fairness, Abuse-Freeness, Multiparty Protocols
  5. Formal Analysis
Network Security Practice
  1. Electronic Mail Security
  2. IP Security
  3. Web Application Security
System Security
  1. Intruder Prevention, Virus Protection
  2. Firewalls
Security Management

Textbook:
Lecture Notes

Reference Books:
B. Schneier:
Applied Cryptography, Second Edition, John Wiley and Son, 1996.
W. Stallings:
Cryptography and Network Security: Principles and Practice, Second Edition, Prentice Hall International, 1999.
D. Gollman:
Computer Security, John Wiley and Sons Ltd., 1998.
C. P. Pfleeger, S.L. Pfleeger:
Security in Computing, 3rd Edition, Prentice Hall, 2002.
M. Rhodes-Ousley, B. Rothke, A. Taylor:
Network Security (The Complete Reference), McGraw-Hill Osborne Media, 2003.
E. D. Zwicky, S. Cooper, D.B. Chapman:
Building Internet Firewalls, Second Edition, O'Reilly, 2000.
C. Adams, S. Lloyd:
Understanding Public-Key Infrastructure: Concepts, Standards and Deployment Considerations, MacMillan Technical Publishing, 1999.
U. O. Pabrai, V. K. Gurbani:
Internet and TCP/IP Network Security, McGraw-Hill, 1996.
L. Loeb:
Secure Electronic Transactions, Artech House Publishers, 1998.
D. O'Mahony, M. Peirce, H. Tewari:
Electronic Payment Systems, Artech House Publishers, 1997.

Grading System:
The final grade will be computed from the following constituent parts: mid-semester (20%), final exam (50%) and assignment and projects (30%). Open-book examination is used for both mid-semester and final exam. ~

Instructor:
Prof. Phan Minh Dung

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: May 2008