This course considers security as it relates to a single computer at an introductory level. Cryptography is introduced and the various scenarios that involve encryption and authentication are investigated. There will be practical work that will give students an opportunity to explore key security tools. The management and planning issues are covered in policy and risk management.
Learning Outcomes
After completing this module, students will be expected to be able to:
1. Identify and describe common security vulnerabilities.
2. Describe the nature of malicious code and how it can spread, be identified and removed.
3. Compare the performance of various cryptographic schemes.
4. Explain the principles of risk analysis and use risk analysis to select controls.
Outline Syllabus
Principles of security
- Confidentiality, integrity and availability (CIA)
- Vulnerabilities, threats, controls
- Forensics and recovery of systems
Secure Applications
- Common problems in applications
- Detailed example of stack based buffer overflow
Malware and malicious code
- Viruses, trojans, worms
- History and classification
- Anatomy of a virus and how viruses spread
- Identifying viruses and antivirus software
Cryptography
- Applications of encryption to computer security
- Types of encryption algorithms
- Examples of encryption algorithms commonly used
- Public-key cryptography
User authentication
-Methods of user authentication
-Biometric access control (e.g. fingerprint, iris etc.)
-Other techniques (e.g. smartcard)
Security policy
-Example security policy
Learning Outcomes
After completing this module, students will be expected to be able to:
1. Identify and describe common security vulnerabilities.
2. Describe the nature of malicious code and how it can spread, be identified and removed.
3. Compare the performance of various cryptographic schemes.
4. Explain the principles of risk analysis and use risk analysis to select controls.
Outline Syllabus
Principles of security
- Confidentiality, integrity and availability (CIA)
- Vulnerabilities, threats, controls
- Forensics and recovery of systems
Secure Applications
- Common problems in applications
- Detailed example of stack based buffer overflow
Malware and malicious code
- Viruses, trojans, worms
- History and classification
- Anatomy of a virus and how viruses spread
- Identifying viruses and antivirus software
Cryptography
- Applications of encryption to computer security
- Types of encryption algorithms
- Examples of encryption algorithms commonly used
- Public-key cryptography
User authentication
-Methods of user authentication
-Biometric access control (e.g. fingerprint, iris etc.)
-Other techniques (e.g. smartcard)
Security policy
-Example security policy
- Module Supervisor: Jianhua He