At the end of this course, the students; 1) State the basic concepts in information security, including security policies, security models, and various security mechanisms. 2) Explain concepts related to applied cryptography, including plaintext, ciphertext, symmetric cryptography, asymmetric cryptography, and digital signatures.
MODE OF DELIVERY
Face to face
PRE-REQUISITES OF THE COURSE
No
RECOMMENDED OPTIONAL PROGRAMME COMPONENT
There is no recommended optional programme component for this course.
COURSE DEFINITION
This course aims at presenting the fundamental principles in secure computing. Topics considered include secure information systems concept, basic encryption and decryption, secure encryption systems, protocols and practices.
COURSE CONTENTS
WEEK
TOPICS
1st Week
Basic security concepts
2nd Week
Basic cryptography
3rd Week
Secret key cryptography
4th Week
Message digests
5th Week
Public key cryptography
6th Week
Authentication
7th Week
Trusted intermediaries
8th Week
Midterm
9th Week
Real-time communication and security
10th Week
Real-time communication and security
11th Week
Real-time communication and security
12th Week
Real-time communication and security
13th Week
Access control
14th Week
Access control
RECOMENDED OR REQUIRED READING
"An Introduction to Computer Science Using Java", Samuel N. Kamin, McGraw-Hill, 2002.
"Object-Oriented Programming in Java", M. KALIN, Prentice Hall, 2001.
"Object-Oriented Systems Development", Carol Britton, McGraw-Hill, 2001.
"Object-Oriented Programming with JAVA", D.J. Barnes, Prentice Hall, 2000.