CENG 561
Advanced Information Security
Concepts and applications of system and data security. Topics include risks and vulnerabilities, policy formation, controls and protection methods, database security, encryption, authentication technologies, host-based and network-based security issues, personnel and physical security issues, issues of law and privacy. Areas of particular focus include secure network design, implementation and transition issues, and techniques for responding to security breaches.
Course Objectives
To teach the fundamental topics and theorems of computer security. To teach the doing research, problem analyzing, defining alternative solutions, comparing them and modeling the solution techniques for the ICT security. To teach the hot topic concepts, research areas and problems of computer science which are related to ICT security.
Recommended or Required Reading
Aleph One – Smashing the Stack for Fun and Profit: http://www.phrack.org/issues.html?issue=49&id=14#article ,US Security Awareness (.org): http://www.ussecurityawareness.org/highres/index.html ,NSU InfoSec web site (of course): http://infosec.nova.edu/ ,Bruce Schneier – Crypto-gram Newsletter: http://www.schneier.com/crypto-gram.html ,Microsoft Security Guidance Center: http://www.microsoft.com/security/guidance/default.mspx ,B. Matt, Introduction to Computer Security ,Addison-Wesley, Pearson Education, 2005 ,SNORT.ORG: http://www.snort.org/
Learning Outcomes
1 . The analyzing and modelling capability for the security architectures of the Information and Communication systems which are the coming with technological improvements.
2. Defining and modelling capability of security problems of new technological improvements and related hot topic security research problems.
3. To have the estimate and plan capability for the future study and research areas of security and the theoretical parts of computer science.
4. To be able to design and manage new information security interdisciplinary projects which have the positive impact to social life.
| Topics |
| Introduction Module 1: Introduction to Computer Security and Assurance |
| Introduction Module 1: Introduction to Computer Security and Assurance |
| Introduction Module 1: Introduction to Computer Security and Assurance |
| Module 2: Policies |
| Module 2: Policies |
| Module 3: Cryptography and Key Management |
| Module 3: Cryptography and Key Management |
| Module 3: Cryptography and Key Management |
| Module 4: Authentication and Access Control |
| Module 4: Authentication and Access Control |
| Module 5: Network Security and Intrusion Detection |
| Module 5: Network Security and Intrusion Detection |
| Course Project completion |
| Course Project completion |
Grading
Midterm 25%
Presentation 40%
Final 35%
- CENG 500
- CENG 501
- CENG 502
- CENG 503
- CENG 504
- CENG 505
- CENG 506
- CENG 507
- CENG 508
- CENG 509
- CENG 511
- CENG 512
- CENG 513
- CENG 514
- CENG 515
- CENG 516
- CENG 517
- CENG 518
- CENG 521
- CENG 522
- CENG 523
- CENG 524
- CENG 525
- CENG 531
- CENG 532
- CENG 533
- CENG 534
- CENG 541
- CENG 542
- CENG 543
- CENG 544
- CENG 551
- CENG 552
- CENG 555
- CENG 556
- CENG 557
- CENG 562
- CENG 563
- CENG 564
- CENG 565
- CENG 566
- CENG 567
- CENG 568
- CENG 590
- CENG 608
- CENG 611
- CENG 612
- CENG 613
- CENG 631
- CENG 632
- CENG 641
- CENG 642
- CENG 643
- CENG 651
- CENG 661
- CENG 662
- CENG 663
