||Types of security breaches; people involved; security
goals; methods of defense (general introduction to cryptography,
protocols, and security policy and management); applications of
cryptographic methods (software security, OS security, database security,
network security, etc.)
||CSCI 3532 and MATH 3331|
||Introduction to malicious programs
||introduction to secure programming: general principles, examples of insecure code; common problems of insecure programs; types of secure programs, tools for secure programming||?
and secure programming|
||Introduction to cryptography and cryptanalysis; study of simple encryption involving substitution and transposition, including monoalphabetic and polyalphabetic substitutions, Vigenere tableau, and the Kasiski method.||Discrete
Programming in C
||Further study of cryptography and cryptanalysis, including index of coincidence, columnar transpositions, fractionated Morse; review of fundamental concepts such as confusion, diffusion, stream ciphers, block ciphers.||Cryptography overview||*Cryptography|
||Introduction to issues and methods in administering
security in computer systems, such as security planning, risk analysis,
security policies, disaster recovery, physical security, and management of
files, accounts, groups, devices, procedures, keys, passwords, emails, and
network security, etc.
||Overview of computer security||*Security Systems Management|
ethical issues in security
||Topics to be discussed include computer crimes, privacy,
protecting programs and data by patents, copyrights, and trademarks,
eithical analysis, professional ethics codes, etc.
||Overview of computer security||*Legal and Ethical Issues|