Attacks on networked systems, tools and techniques for detection and protection against attacks including firewalls and intrusion detection and protection systems, authentication and identification in distributed systems, cryptographic protocols for IP networks, security protocols for emerging networks and technologies, privacy enhancing communication. Legal and ethical issues will be introduced as necessary.
This course may not be repeated for credit.
Notes
- Computer Science 418 and 441, or equivalents, are recommended as preparation for this course. Lectures may run concurrently with Computer Science 526.
SyllabusSections
This course will be offered next in
Fall 2018.