Document Type

Syllabus

Publication Date

Spring 2024

Course Description

This course examines and discusses computer security, how to protect our computing infrastructure from illegal access, tempering, denial of access etc… We will first define terms such as security and secure computing, then we’ll talk about cryptography including symmetric and public key cryptographic techniques and their applications. Other topics covered include secure software, cyber security, database security, system security and hardware security.

Student Outcomes

1. Students will be able to understand the definition of security and the “design flaws” that have, so far, made it impossible to secure the Internet. 2. Students will learn about the history of cryptography and cryptographical algorithm ranging from the Caesar Cipher to the current cryptographic standards. 3. Students will learn about intentional and non-intentional malicious code and guidelines to developing secure code. 4. Students will learn about network and web application security and guidelines to designing secure web applications. 5. Students will learn about perimeter security including firewalls and Intrusion Detection Systems. 6. Students will demonstrate knowledge of technology and its implications in society and be able to leverage technology, where appropriate, for creative activities or innovative solutions to problems.

Share

COinS