The different types of cyber-crime and the vulnerability of computer systems and information networks are studied. Mitigation approaches for the protection of data and computer systems are explored.
- Demonstrate knowledge of fundamental principles of information security
- Ability to apply those principles in practice to provide the core security requirements – Confidentiality, Integrity, and Availability
- Ability to apply those principles in practice for additional security requirements including Non-repudiation
- Understand common threats faced in today’s world
- Formulate information security objectives of privacy (confidentiality), data integrity, authentication, and non-repudiation
- Describe the fundamental axioms and concepts in abstract algebra and number theory that form the foundation of network and computer security solutions.
- Design and implement cryptosystems based on the design principles of symmetric-key and asymmetric-key algorithms
- Design and implement cryptosystems based on the design principles of elliptic curve cryptography-based factorization methods
- Explain how cryptographic algorithms and protocols have been employed in various security solutions and standards
Contact hours: 45
Lecture hours: 40
Lab hours: 5
Faculty office hours: faculty is available outside class hours by appointment, via email, and at scheduled times.
Advising: faculty and career counselors are available to assist students with their career directions and questions