Computer System Security

  • College of Computing & Information Technology |
  • English

Description

The course is an introduction to computer and network security. The course encompasses the study of security mechanisms for secrecy, integrity, and availability. Topics include basic cryptography and its applications, security in computer networks and distributed systems and control and prevention of viruses and other rogue programs. In addition, hands-on experience will be provided through a series of programming assignments.

Program

Computer Science Program

Objectives

  • 1. Identify threats and security attacks to computer systems.
    2. Master symmetric and asymmetric cryptography techniques.
    3. Experiment with symmetric and asymmetric key distribution protocols.
    4. Experiment with message authentication mechanisms
    5. Experiment with system security

Textbook

W. Stallings, Cryptography and Network Security, Principles and Practices, Prentice Hall.

Course Content

content serial Description
1Course Introduction
2Classical Encryption Techniques
3Data Encryption Standard (DES)
4Block cipher design principles/modes of operation and Triple DES (3DES)
5Introduction to Number Theory
6Public Key cryptography
77th Week Exam
8Key Distribution for Symmetric Encryption
9Key Distribution for Asymmetric Encryption
10Key Distribution for Asymmetric Encryption (cont.)
11Message Authentication
1212th Week Exam
13Digital Signatures
14Firewalls
15Intrusion Detection
16Final exam
1Course Introduction
2Classical Encryption Techniques
3Data Encryption Standard (DES)
4Block cipher design principles/modes of operation and Triple DES (3DES)
5Introduction to Number Theory
6Public Key cryptography
77th Week Exam
8Key Distribution for Symmetric Encryption
9Key Distribution for Asymmetric Encryption
10Key Distribution for Asymmetric Encryption (cont.)
11Message Authentication
1212th Week Exam
13Digital Signatures
14Firewalls
15Intrusion Detection
16Final exam
1Course Introduction
2Classical Encryption Techniques
3Data Encryption Standard (DES)
4Block cipher design principles/modes of operation and Triple DES (3DES)
5Introduction to Number Theory
6Public Key cryptography
77th Week Exam
8Key Distribution for Symmetric Encryption
9Key Distribution for Asymmetric Encryption
10Key Distribution for Asymmetric Encryption (cont.)
11Message Authentication
1212th Week Exam
13Digital Signatures
14Firewalls
15Intrusion Detection
16Final exam

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.