Dr Andrew Scott G7VAV

My photo
 
June 2018
Mo Tu We Th Fr Sa Su
28 29 30 31 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 1
2 3 4 5 6 7 8


SCC 439: Network System Security
  1. Introduction:
    • Attacker and defender
    • Security concepts
    • Security trade-off
  2. Cryptographic Techniques:
    • Symmetric key cryptography
    • Public key cryptograpy
    • Hash functions
    • Digital signatures
    • Key Management
  3. Network Security:
    • Designing secured communication protocols
    • Security on transport, network and application layer
    • Internet security protocols
    • Examples of good and bad protocol design
    • Breaking communication protocols
  4. System Security:
    • Firewalls and intrusion detection systems
    • Specific threats on end-systems
    • Architectural and OS issues
    • Viruses, worms, trojan horses, etc.
    • Examples of how to secure larger systems
Recommended Texts
Schneier
Bruce Schneier,
Applied Cryptography: Protocols, Algorithms and Source Code in C
John Wiley & Sons, 16 November 1995, Paperback: 758 pages
ISBN:0471117099
Anderson
Ross J. Anderson,
Security Engineering: A Guide to Building Dependable Distributed Systems
John Wiley & Sons, 11 April 2008, Hardcover: 1080 pages
ISBN:0470068523


for client 54.158.30.219: 53078
© Andrew Scott 2006 - 2018,
All Rights Reserved
http://www.andrew-scott.uk/
http://www.andrew-scott.co.uk/
http://www.andrew-scott.eu/