Lecturer: Dr R.J. Anderson (rja14@cl.cam.ac.uk)
No. of lectures: 6
Prerequisite courses: Operating System Foundations, Mathematics for Computation Theory
This course is a prerequisite for Distributed Systems.
Aims
The aim of this course is to introduce the basic concepts of computer security and cryptography and thus provide a foundation for courses on both security and distributed systems.
Lectures
Objectives
By the end of the course students should appreciate the range of different meanings that ``security'' has in different applications, and should be familiar with the most common commercial and military security policy concepts. They should understand the protection mechanisms used in common systems, and the most common attacks on them. They should be cryptography-literate, understanding the basics of public and shared key systems, block cipher modes of operation and authentication protocols.
Recommended books
Gollmann, D. (1999). Computer Security. Wiley.
Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms,
and Source in C. Wiley (2nd ed.).
Further reading:
Anderson, R. (2001). Security Engineering. Wiley.
Kahn, D. (1966). The Codebreakers: the Story of Secret
Writing. Weidenfeld and Nicolson.
Cheswick, W.R. & Bellovin, S.M. (1994). Firewalls and Internet
Security: Repelling the Wily Hacker. Addison-Wesley.
Garfinkel, S. & Spafford, G. (1996). Practical Unix and Internet
Security. O'Reilly (2nd ed.).
Amoroso, E. (1994). Fundamentals of Computer Security
Technology. Prentice-Hall.