Course
code | IS703 |
credit_hours | 3 |
title | Information Systems Security |
arbic title | |
prequisites | none |
credit hours | 3 |
Description/Outcomes | Overview of computer security. Access control matrix Security policies Confidentiality policies Integrity policies Hybrid policies Noninterference and policy composition Cryptography Key management Cipher techniques Authentication Access and control mechanisms Information flow Confinement problem Introduction to assurance Building systems with assurance Formal methods Evaluating security systems Malicious logic Vulnerability analysis. Auditing Intrusion detection Network Security, Email security, IP security, and Web security. System security User security Program security. |
arabic Description/Outcomes | |
objectives | The student should be able to:• Discuss security services• Discuss security policies• Discuss symmetric-key cryptography and public-key cryptography• Discuss key agreement protocols• Discuss group key agreement protocols• Discuss email security protocols such as PGP• Discuss web-security protocols such as SSL• Discuss Intrusion Detection techniques |
arabic objectives | |
ref. books | • Matt Bishop, Computer Security: Art and Science, Pearson Education, 2003.• William Stallings, Cryptography and Network Security: principles and Practices, 3rd Edition, Pearson Education, 2003.• ACM Transactions on Information and System Security• IEEE Transactions on Dependable and Secure Computing |
arabic ref. books | |
textbook | |
arabic textbook | |
objective set | |
content set | |