Overview of computer security. Attacks and services. Control of usage: hardware and software.
Encryption and Authentication
Conventional encryption model. Data encryption standard (DES). Advanced Encryption Standard (AES). Traffic confidentiality. Key distribution. Public-key cryptology. The RSA algorithm. Key management. Authentication requirements, functions and protocols. Digital signatures.
Intruders, Viruses and Worms
Intrusion techniques. Nontechnical attacks. Password protection and its vulnerability. Intrusion detection. Nature of viruses. Malicious programs. Types of viruses. Antivirus approaches. Worm propagation and countermeasures: access control, intrusion detection and firewalls.
Recovery requirements. Recovery policy, and strategy. Recovery technical team. Execution of recovery plans. Documentation and backup system. Loss estimation.
Learning Outcome of Subject (% of contribution)
At the completion of the subject, students should be able to perform the following tasks:
LO1 – Describe the basic concepts and underlying issues of cryptography, computer security and disaster recovery. (Cognitive – remembering, level 1) - 20%
LO2 – Use various ciphers and number theoretic algorithms. (Cognitive – applying, level 3) - 20%