next up previous contents
Next: Specification and Verification I Up: Lent Term 2002: Part Previous: Optimising Compilers   Contents

Security

Lecturer: Mr M.G. Kuhn (mgk25@cl.cam.ac.uk)

No. of lectures + examples classes: 14 + 2

Prerequisite courses: Introduction to Security, Discrete Mathematics, Operating Systems, Digital Communication, Information Theory and Coding

This course is a prerequisite for E-Commerce (Part II).


Aims


This course not only offers an extended treatment of the basic topics covered in Introduction to Security but also includes more specialised areas such as CPU-based protection mechanisms, physical security, steganography, copyright protection techniques, anonymous communication, vulnerabilities of network protocols, security management.


Lectures

Objectives


At the end of the course students should be able to tackle an information protection problem by drawing up a threat model, formulating a security policy, and designing specific protection mechanisms to implement the policy.


Recommended books


Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
Gollmann, D. (1999). Computer Security. Wiley.
Stinson, D.R. (1995). Cryptography: Theory and Practice. CRC Press.


Further reading:


Menzenes, A.J. et al. (1996). Handbook of Applied Cryptography. CRC Press.
Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source in C. Wiley (2nd ed.).
Cheswick, W.R. & Bellovin, S.M. (2001). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley (2nd ed.).
Garfinkel, S. & Spafford, G. (1996). Practical Unix and Internet Security. O'Reilly (2nd ed.).
Koblitz, N. (1994). A Course in Number Theory and Cryptography. Springer-Verlag (2nd ed.).
Amoroso, E. (1994). Fundamentals of Computer Security Technology. Prentice-Hall.



next up previous contents
Next: Specification and Verification I Up: Lent Term 2002: Part Previous: Optimising Compilers   Contents
Christine Northeast
Tue Sep 4 09:34:31 BST 2001