Computer and Information Security Topics
Textbook by Mark Stamp: Information Security (2nd edition, McGraw-Hill, 2011)
Information security relies on the art and craft of cryptography. You will learn how this technique can be applied to ensure the confidentiality of important information. (This course will cover both private and public cryptosystems.)
Hashing techniques will be explored: they are used to create a message authentication code that will guarantee the integrity of the information.
Authentication strategies (possibly employing digital signatures) will be investigated
Various and sundry computer security topics will be discussed as they relate to infiltration over the Internet, and abuse of the network itself.
Midterm Exam: March 7th (TH) 35%
Final Exam: May 10th 3-5:30PM (T) 35%
Quizzes and Homework 30%
Weeks #1-7 (Chapters 1-6) - First we will cover the basics of information security, with special emphasis on the science, art, and practice of cryptography, using a large collection of examples, outlining specific mechanisms from several different types of cryptosystems, many of which will not be in Stamp's book. These will include, but are not limited to: one-time pads, RSA, DES, AES, etc. Other topics for the first half of the semester include: cryptanalysis, digital signatures, stream and block ciphers, symmetric and asymmetric schemes, public key systems, and crypto-logically based hash functions.
Weeks 9-14 (Chapters 7-13) -
Continue with the investigation of security, covering: some specific system and
network security issues; authentication, authorization and privacy concerns;
real world security protocols; e-voting; viruses, worms, and other forms of
intrusion/software malfunctions; and various and sundry other related topics .
Prof. John Trono, Jeanmarie 267, Phone - X2432; office hours: MW, 3-4pm,T 9-10:30am or by appointment.
Back to Prof. Trono's Home page. (This page last modified January 08, 2003 .)