SCC 439: Network System Security
- Introduction:
- Attacker and defender
- Security concepts
- Security trade-off
- Cryptographic Techniques:
- Symmetric key cryptography
- Public key cryptograpy
- Hash functions
- Digital signatures
- Key Management
- Network Security:
- Designing secured communication protocols
- Security on transport, network and application layer
- Internet security protocols
- Examples of good and bad protocol design
- Breaking communication protocols
- System Security:
- Firewalls and intrusion detection systems
- Specific threats on end-systems
- Architectural and OS issues
- Viruses, worms, trojan horses, etc.
- Examples of how to secure larger systems
Recommended Texts
© Andrew Scott 2006 -
2025,
All Rights Reserved