• Tidak ada hasil yang ditemukan

Computer Security Systems

N/A
N/A
Protected

Academic year: 2024

Membagikan "Computer Security Systems"

Copied!
2
0
0

Teks penuh

(1)

ةيدوعسلا ةيبرعلا ةكلمملا ميلعتلا ةرازو ىرقلا مأ ةـعماـج مضأب ةيعماجلا ةيلكلا Kingdom of Saudi Arabia

Ministry of Education Umm Al-Qura University University College in Adham

Computer Security Systems

6803532-3 - Computer Security Systems (3 credits)

Catalog Description

This course is the first level of computer and network security. The course will cover various topics related to computer security, data privacy, network protection against various attacks. The course gives students enough knowledge and a reasonable background to understand network security, active and passive attacks, Internet privacy, secure communications. Students are expected to practice biweekly homeworks, develop critical thinking about computer and network security, and apply learned materials in different contexts of various attacks, wireless and Internet security.

Prerequisites

6803411-3 – Operating Systems

Major Topics Covered in the Course (14 week semester)

Topic Week

Overview of computer security services 1

Passive and active attacks 2

Cryptographic public and symmetric keys: DES 3-4

Advanced Encryption Standard AES 5

Public key cryptography, and RSA algorithm 6-7

El-Gamal cryptosystem 8

Digital signatures and message authentication protocols 9-10

Transport layer security, SSL protocol, MAC scheme 11-12

Wireless security protocols, WPA, WEP 13

Viruses, and Internet attacks 14

Weekly Hours

3 x 50 mins lectures, 0 lab hours

(2)

Textbook/References

Network Security Essentials, Fourth Edition, William Stallings, 2011 Additional materials will be distributed during the course.

Assessment Methods

Home works 20 % Quiz 15%

Midterm 20 % Research Paper 5%

Final Exam 40 %

Course Learning Outcomes (CLOs)

1. Appreciate the need for computer security and computer protection, including the tradeoffs between different security and protection methods

2. Able to apply concepts of public keys, private keys, cryptosystem, authentication, digital signatures to secure simple systems.

3. Implement some network security protocols such as SSL, MAC, and wireless security, WEP, WAP, and computer viruses, and Internet attacks, and utilize them in real applications to secure Internet traffic.à

Referensi

Dokumen terkait

 Computer Security Incident Handling Guide – Computer Security Incident Handling Guide –. NIST Special Publication 800-61 NIST Special

 1999 Computer Security Institute (CSI) / FBI Computer Crime Survey menunjukkan beberapa statistik yang menarik, seperti misalnya ditunjukkan bahwa “disgruntled worker” (orang

Topics to be covered: Cyber Ethics, Trojans, Backdoors, web application attacks, wireless hacking and security, mobile, VOIP hacking, System & Network hacking , Email hacking &

Computer Security allows the University to carry out its mission by: l Enabling people to carry out their jobs, education, and research l Supporting critical business

Operating Systems/OS and Security Question Bank P.C.P.Bhat/IISc Bangalore M9/V1/June 04/1 Question Bank 9.1 What is vulnerability?. 9.2 What is a security

There have been many products from security vendors with gaping security holes Principle 9: Don't extend trust easily Impact The Slammer worm 2003 penetrated a private computer

Major Topics Covered in the Course Week Topic 1 ﺔفﺎﺿإلاو فذلحا 2 Course outline 3 Introduction to software engineering 4 5 Software Processes 6 Software Requirements Engineering

1 Kingdom of Saudi Arabia ةيدوعسلا ةيبرعلا ةكلمملا Ministry of Education ميلعتلا ةرازو Umm AlQura University ىرقلا مأ ةعماج Adham University College مضأب ةيعماجلا ةيلكلا Computer