Information Security Theory

Download Brochure

START:
January 1, 2020
DURATION:
Contact hours: 45
Lecture hours: 40
Lab hours: 5
ID:
RU 6201
CREDIT:
3

Address

205 Van Buren Street, Suite 140, Herndon, VA 20170   View map

The different types of cyber-crime and the vulnerability of computer systems and information networks are studied. Mitigation approaches for the protection of data and computer systems are explored.

Objectives:

  • Demonstrate knowledge of fundamental principles of information security
  • Ability to apply those principles in practice to provide the core security requirements – Confidentiality, Integrity, and Availability
  • Ability to apply those principles in practice for additional security requirements including Non-repudiation
  • Understand common threats faced in today’s world
    • Formulate information security objectives of privacy (confidentiality), data integrity, authentication, and non-repudiation
    • Describe the fundamental axioms and concepts in abstract algebra and number theory that form the foundation of network and computer security solutions.
    • Design and implement cryptosystems based on the design principles of symmetric-key and asymmetric-key algorithms
    • Design and implement cryptosystems based on the design principles of elliptic curve cryptography-based factorization methods
    • Explain how cryptographic algorithms and protocols have been employed in various security solutions and standards

Prerequisite: None
Credits: 3
Contact hours: 45
Lecture hours: 40
Lab hours: 5
Faculty office hours: faculty is available outside class hours by appointment, via email, and at scheduled times.
Advising: faculty and career counselors are available to assist students with their career directions and questions