Attacks on networked systems, tools and techniques for detection and protection against attacks including firewalls and intrusion detection and protection systems, authentication and identification in distributed systems, cryptographic protocols for IP networks, security protocols for emerging networks and technologies, privacy enhancing communication. Legal and ethical issues will be introduced.
This course may not be repeated for credit.
Notes
- Computer Science 329 and one of Pure Mathematics 329, Computer Science 418, or Pure Mathematics 418 are recommended as preparation for this course.
Antirequisite(s)
- Credit for both Computer Science 526 and 529 will not be allowed.
Sections
This course will be offered next in
Winter 2015.