Overview of computer security. Access control matrix Security policies Confidentiality policies Integrity policies Hybrid policies Noninterference and policy composition Cryptography Key management Cipher techniques Authentication Access and control mechanisms Information flow Confinement problem Introduction to assurance Building systems with assurance Formal methods Evaluating security systems Malicious logic Vulnerability analysis. Auditing Intrusion detection Network Security, Email security, IP security, and Web security. System security User security Program security.
Master of Computing in Information Systems
Data will be available soon!
content serial | Description |
---|
Start your application