Dr Andrew Scott G7VAV

My photo
 
February 2025
Mo Tu We Th Fr Sa Su
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 1 2
3 4 5 6 7 8 9


SCC 439: Network System Security
  1. Introduction:
    • Attacker and defender
    • Security concepts
    • Security trade-off
  2. Cryptographic Techniques:
    • Symmetric key cryptography
    • Public key cryptograpy
    • Hash functions
    • Digital signatures
    • Key Management
  3. Network Security:
    • Designing secured communication protocols
    • Security on transport, network and application layer
    • Internet security protocols
    • Examples of good and bad protocol design
    • Breaking communication protocols
  4. System Security:
    • Firewalls and intrusion detection systems
    • Specific threats on end-systems
    • Architectural and OS issues
    • Viruses, worms, trojan horses, etc.
    • Examples of how to secure larger systems
Recommended Texts
Schneier
Bruce Schneier,
Applied Cryptography: Protocols, Algorithms and Source Code in C
John Wiley & Sons, 16 November 1995, Paperback: 758 pages
ISBN:0471117099
Anderson
Ross J. Anderson,
Security Engineering: A Guide to Building Dependable Distributed Systems
John Wiley & Sons, 11 April 2008, Hardcover: 1080 pages
ISBN:0470068523


for client 18.97.9.170
© Andrew Scott 2006 - 2025,
All Rights Reserved
http://www.andrew-scott.uk/
Andrew Scott
http://www.andrew-scott.co.uk/