The Citadel

The Military College of South Carolina

log.jpg

CSCI 327: Computer Security

Course Description:

CSCI 327 Computer Security Three Credit Hours
Prerequisite: {CSCI 202 and MATH 206} or {ELEC 206 and ELEC 311}
A survey of the principles and practices related to computer security emphasizing the problems of security associated with computer networks. Topics include cryptography, privacy, authentication, access control and authorization, security policies, and legal and ethical issues. A significant component of the course is the investigation of attacks commonly used by computer criminals and strategies that can be used to thwart the attacks.

Major Topics:

  • Components of Computer Security
  • Access Control Matrix
  • Security Policies
  • Confidentiality Model: Bell-Lapadula
  • Integrity Model: Biba, Clark-Wilson
  • Hybrid Model: Chinese Wall, Clinical Information Systems Security Policy
  • Classical and Public Key Cryptography: Caesar Cipher, Vigere Cipher, DES, RSA
  • Key Management Protocols
  • Authentication
  • Malicious Logic
  • Assurance and Trust
  • Design Principles

Course Outcomes:

Upon successful completion of this course, a student will be able to

  • list the fundamental concepts of Information Assurance and Cyber Defense
  • describe different types of attacks and their characteristics
  • describe how fundamental concepts of cyber defense can be used to provide system security
  • explain different models of confidentiality and integrity
  • identify elements of cryptographic systems
  • describe differences between symmetric and asymmetric cryptography
  • analyze different cryptographic protocols, tools, and techniques
  • analyze the weakness and strength of a cryptosystem
  • list first principle of security
  • describe each design principle of security and how it can be used in security mechanisms
  • identify common security failures and violation of design principles
  • describe the importance of human machine interface and usability factor in security
  • understand the concepts of key management and authentication
  • understand the features of different malicious logics

Textbook:

Introduction to Computer Security by Matt Bishop, Addison-Wesley

Computer Security: Principles and Practice, William Stallings and Lawrie Brown, Pearson

Projected Schedule:

Every Other Fall (Even Calendar Years)

Recent Syllabi:

Fall, 2014 Banik

Back to Top