CS 461 - Computer Security I

Spring 2022

TitleRubricSectionCRNTypeHoursTimesDaysLocationInstructor
Computer Security ICS461AL448199LCD41400 - 1515 W F  1404 Siebel Center for Comp Sci  Michael Bailey
Nikita Borisov
Computer Security ICS461ALG70797LCD41400 - 1515 W F  1404 Siebel Center for Comp Sci  Michael Bailey
Nikita Borisov
Computer Security ICS461AY163507DIS00900 - 0950 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY263508DIS01000 - 1050 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY363509DIS01100 - 1150 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY463510DIS01200 - 1250 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY563511DIS01300 - 1350 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY663513DIS01400 - 1450 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY748198DIS01500 - 1550 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY872176DIS01600 - 1650 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security ICS461AY972177DIS01700 - 1750 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AL448201LCD41400 - 1515 W F  1404 Siebel Center for Comp Sci  Michael Bailey
Nikita Borisov
Computer Security IECE422ALG70798LCD41400 - 1515 W F  1404 Siebel Center for Comp Sci  Michael Bailey
Nikita Borisov
Computer Security IECE422AY163514DIS00900 - 0950 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY263515DIS01000 - 1050 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY363516DIS01100 - 1150 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY463517DIS01200 - 1250 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY563518DIS01300 - 1350 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY663519DIS01400 - 1450 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY770256DIS01500 - 1550 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY872179DIS01600 - 1650 R  1105 Siebel Center for Comp Sci  Michael Bailey
Computer Security IECE422AY972180DIS01700 - 1750 R  1105 Siebel Center for Comp Sci  Michael Bailey

Official Description

Fundamental principles of computer and communications security and information assurance: ethics, privacy, notions of threat, vulnerabilities, and risk in systems, information warfare, malicious software, data secrecy and integrity issues, network security, trusted computing, mandatory and discretionary access controls, certification and accreditation of systems against security standards. Security mechanisms: authentication, auditing, intrusion detection, access control, cryptography, security protocols, key distribution. Course Information: Same as ECE 422. 4 undergraduate hours. 4 graduate hours. Prerequisite: CS 241 or ECE 391.

Text(s)

Computer Security: Principles and Practice, 2nd. Ed., by William Stalling and Lawrence Brown

Learning Goals

Assess and address Security and Privacy (S&P) issues for policy and humans. That is, characterize and classify the threats based on human conformance to policy and evaluate the effectiveness of a range of countermeaures. (1)
Provide S&P risk analysis for basic scenarios based on core principles, specifically the Confidentiality, Integrity, Availability (CIA) requirements. (1)
Apply cryptographic hashes, pseudorandom generators, symmetric, and asymmetric cryptography with appropriate tradeoffs. (1,2,3)
Evaluate options for authentication based on secrets, tokens, and biometrics. (1)
Understand network, application, and systems security. (1,2)
Formulate access control models for basic situations. (1,2)
Write and mitigate malicious code and characterize basic means of its propagation. (1,2,3)
Assess the threat of basic Denial of Service (DoS) attacks. (1)
Provide network securty protections using firewalls and IDSs. (1,2)
Assess threats based on physical layer. (1)
Apply legal and ethical rules for S&P. (4)

Topic List

Human issues in S&P
S&P risk assessment
History of cryptography
Symmetric key encryption
Asymmetric key encryption
Systems security
Database security
Application security
Web application security
Network security
Digital signatures
Cryptology
Authentication
Authorization
Malicious code
Threat Modeling
DoS
Intrusion Detection & Firewalls
Legal and Ethical Isssues in S&P
Trusted Operating systems
Evaluation and Auditing
Physical layer security threats

Required, Elective, or Selected Elective

Selected Elective.

Last updated

3/6/2019by Ryan Matthew Cunningham