next up previous contents
Next: Natural Language Processing Up: Lent Term 2000: Part Previous: Neural Computing

Security

Lecturer: Dr R. Anderson (rja14@cl.cam.ac.uk)

No. of lectures: 12

Prerequisite courses: Introduction to Security, Discrete Mathematics, Operating Systems, Digital Communication I, Digital Communication II, Information Theory and Coding


Aims


This course aims to give students a thorough understanding of computer security technology. This includes high-level issues such as security policy (modelling what ought to be protected) and engineering (how we can obtain assurance that the protection provided is adequate). It also involves the protection mechanisms supported by modern processors and operating systems; cryptography and its underlying mathematics; electrical engineering issues such as tempest and tamper resistance; and a wide variety of attacks ranging from network exploits through malicious code to protocol failure.


Lectures

Objectives


At the end of the course students should be able to tackle an information protection problem by drawing up a threat model, formulating a security policy, and designing specific protection mechanisms to implement the policy.


Recommended books


Gollmann, D. (1999). Computer Security. Wiley.
Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source in C. Wiley (2nd ed.).


Further reading:


Kahn, D. (1966). The Codebreakers: the Story of Secret Writing. Weidenfeld and Nicolson.
Cheswick, W.R. & Bellovin, S.M. (1994). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley.
Biham, E. & Shamir, A. (1993). Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag.
Koblitz, N. (1994). A Course in Number Theory and Cryptography. Springer-Verlag (2nd ed.).
Neumann, P. (1994). Computer Related Risks. Addison-Wesley.
Leveson, N.G. (1995). Safeware: System Safety and Computers. Addison-Wesley.
Garfinkel, S. & Spafford, G. (1996). Practical Unix and Internet Security. O'Reilly (2nd ed.).
Davies, D.W. & Price, W.L. (1984). Security for Computer Networks. Wiley.
Beker, H. & Piper, F. (1982). Cipher Systems. Northwood.
Cohen, F.B. (1994). A Short Course on Computer Viruses. Wiley (2nd ed.).
Amoroso, E. (1994). Fundamentals of Computer Security Technology. Prentice-Hall.



next up previous contents
Next: Natural Language Processing Up: Lent Term 2000: Part Previous: Neural Computing
Christine Northeast
Mon Sep 20 10:28:43 BST 1999