Module: Introduction to Computer Security

Created:Oct. 21, 2003
Updated: Oct. 23, 2003
Updated: Feb. 5, 2004
Updated: Feb. 20, 2004

Module version number: Version 0.1
Author: T. Andrew Yang


Code: CSCI001


Objectives


This module provides a basic coverage of general issues related to computer security.

Prerequisite

CSCI 3532 and MATH 3331


Description

This module provides a collection of sub-modules which altogether provide an overview of computer security. The submodules should allow a student to gain a fundamental understanding of cryptography and security protocols, and their applications to various areas, including operating system security, database security, software security, and networking security. In addition, submodules discussing ethics and legal issues, and management of security systems are also provided. 


Submodules

Submodule #
Title
code
Description
Prerequisite
*Referenced module
1
Overview of computer security
Intr1
Types of security breaches; people involved; security goals; methods of defense (general introduction to cryptography, protocols, and security policy and management); applications of cryptographic methods (software security, OS security, database security, network security, etc.)
CSCI 3532 and MATH 3331
2
Introduction to malicious programs
Mali6
introduction to secure programming: general principles, examples of insecure code; common problems of insecure programs; types of secure programs, tools for secure programming ?
*Malicious programs and secure programming
3
Cryptography overview
Cryp1
Introduction to cryptography and cryptanalysis; study of simple encryption involving substitution and transposition, including monoalphabetic and polyalphabetic substitutions, Vigenere tableau, and the  Kasiski method. Discrete Math
Programming in C
*Cryptography
4
Cryptography overview 2
Cryp2
Further study of cryptography and cryptanalysis, including index of coincidence, columnar transpositions, fractionated Morse; review of fundamental concepts such as confusion, diffusion, stream ciphers, block ciphers. Cryptography overview *Cryptography
5
Security Administration
Admi1
Introduction to issues and methods in administering security in computer systems, such as security planning, risk analysis, security policies, disaster recovery, physical security, and management of files, accounts, groups, devices, procedures, keys, passwords, emails, and network security, etc.
Overview of computer security *Security Systems Management
6
Legal & ethical issues in security
Lega1
Topics to be discussed include computer crimes, privacy, protecting programs and data by patents, copyrights, and trademarks, eithical analysis, professional ethics codes, etc.
Overview of computer security *Legal and Ethical Issues


Resources

Books
Articles
Links

Glossary