Course Description : Basic notions of confidentiality, integrity, availability, authentication models, protection models, security kernels, audit, intrusion detection, operational security issues, physical security issues, security system life cycle management, personnel security, policy formation and enforcement, trust modeling, risks and vulnerabilities assessment, basic issues of law and privacy, trade secrets, employee covenants, copyright, database protection, software and hardware validation, verification and certification.
Click here for the full syllabus
Lecture | Download PPT Slides | ||
Lecture 1 : | |||
Lecture 2 : | |||
Lecture 3 : | |||
Lecture 4 : | |||
Lecture 5 : | |||
Lecture 6 : | |||
Lecture 7 : | |||
Lecture 8 : | |||
Lecture 9 : | |||
Lecture 10: | |||
Lecture 11: | |||
Lecture 12: | |||
Lecture 13: | |||
Lecture 14: | |||
Student | Report Title | ||
Katie Kutcher | |||
Robin Chin | |||
Cherie Wentworth | |||
Assignments | Reports | ||
No comments:
Post a Comment