Dr Andrew Scott G7VAV

My photo
 
April 2024
Mo Tu We Th Fr Sa Su
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
6 7 8 9 10 11 12


SCC 439: Network System Security
  1. Introduction:
    • Attacker and defender
    • Security concepts
    • Security trade-off
  2. Cryptographic Techniques:
    • Symmetric key cryptography
    • Public key cryptograpy
    • Hash functions
    • Digital signatures
    • Key Management
  3. Network Security:
    • Designing secured communication protocols
    • Security on transport, network and application layer
    • Internet security protocols
    • Examples of good and bad protocol design
    • Breaking communication protocols
  4. System Security:
    • Firewalls and intrusion detection systems
    • Specific threats on end-systems
    • Architectural and OS issues
    • Viruses, worms, trojan horses, etc.
    • Examples of how to secure larger systems
Recommended Texts
Schneier
Bruce Schneier,
Applied Cryptography: Protocols, Algorithms and Source Code in C
John Wiley & Sons, 16 November 1995, Paperback: 758 pages
ISBN:0471117099
Anderson
Ross J. Anderson,
Security Engineering: A Guide to Building Dependable Distributed Systems
John Wiley & Sons, 11 April 2008, Hardcover: 1080 pages
ISBN:0470068523


for client 3.145.36.10
© Andrew Scott 2006 - 2024,
All Rights Reserved
http://www.andrew-scott.uk/
Andrew Scott
http://www.andrew-scott.co.uk/