|title ||Computer Systems Security|
|arbic title |
|prequisites || |
|credit hours ||3|
|Description/Outcomes ||The course covers theory and practice of computer security, focusing in particular on the security aspects of the web and Internet. It surveys cryptographic tools used to provide security, such as shared key encryption (DES, 3DES, IDEA, AES, RC4, etc.) public key encryption, key exchange, and digital signature (Diffie-Hellmann, RSA, DSS, etc.). It then reviews how these tools are utilized in computer network protocols and applications such as SSL/TLS, IPSEC, Kerberos, PGP, S/MIME, SET, and others, including wireless telecommunications and networks System security issues, such as viruses, intrusion, and firewalls, will also be covered.|
|arabic Description/Outcomes |
- ï‚§ Understand security concepts such as confidentiality, integrity, availability and privacy.
- Understand security threats, and the security services and mechanisms to counter them.
- Develop a basic understanding of cryptography, how it has evolved, and some key encryption techniques used today.
- Develop a basic understanding of information assurance as practised in computer systems and network applications.
- Gain familiarity with network and distributed system attacks, defences against them, and forensics to investigate the aftermath.
|arabic objectives |
|ref. books ||William Stallings, â€œCryptography and Network Security Principles and Practiceâ€, 6th Edition, Prentice Hall, 2014. |
|arabic ref. books |
- Ross Anderson, Security Engineering, Wiley, New York, 2008
- Eric Rescorla. SSL and TLS: Designing and Building Secure Systems, Addison-Wesley, 2001.
- Bruce Schneier, Applied Cryptography â€“ Protocols, Algorithms and Source Code in C, second edition, John Wiley & Sons, New York, 1996
|arabic textbook |
|objective set |
|content set |