Information Systems Security

  • Computer Science |

Description

Overview of computer security. Access control matrix Security policies Confidentiality policies Integrity policies Hybrid policies Noninterference and policy composition Cryptography Key management Cipher techniques Authentication Access and control mechanisms Information flow Confinement problem Introduction to assurance Building systems with assurance Formal methods Evaluating security systems Malicious logic Vulnerability analysis. Auditing Intrusion detection Network Security, Email security, IP security, and Web security. System security User security Program security.

Program

Master of Computing in Computer Science

Objectives

  • The student should be able to:
    • Discuss security services
    • Discuss security policies
    • Discuss symmetric-key cryptography and public-key cryptography
    • Discuss key agreement protocols
    • Discuss group key agreement protocols
    • Discuss email security protocols such as PGP
    • Discuss web-security protocols such as SSL
    • Discuss Intrusion Detection techniques

Textbook

Data will be available soon!

Course Content

content serial Description

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.