INFORMATION SECURITY (3-1-0)
The Security Problem in Computing: The meaning of computer Security, Computer
Criminals, Methods of Defense, Elementary Cryptography: Substitution Ciphers,
Transpositions, Making “Good” Encryption algorithms, The Data Encryption Standard, The
AES Encryption Algorithms, Public Key Encryptions, Uses of Encryption.
Program Security: Secure Programs, Nonmalicious Program Errors, viruses and other
malicious code, Targeted Malicious code, controls Against Program Threats, Protection in
General- Purpose operating system protected objects and methods of protection memory and
addmens protection, File protection Mechanisms, User Authentication Designing Trusted
O.S: Security polices, models of security, trusted O.S design, Assurance in trusted O.S.
Data base Security: Security requirements, Reliability and integrity, Sensitive data, Inference,
multilevel database, proposals for multilevel security.
Security in Network: Threats in Network, Network Security Controls, Firewalls, Intrusion
Detection Systems,Secure E-Mail.
Administering Security: Security Planning, Risk Analysis, Organizational Security policies,
Physical Security. Legal Privacy and Ethical Issues in Computer Security: Protecting
Programs and data, Information and the law, Rights of Employees and Employers, Software
failures, Computer Crime, Praia, Ethical issues in Computer Security, case studies of Ethics.