Course Outcomes for CSC 474 - Information Systems Security
- list the basic concepts in information security, including security policies, security models, and various security mechanisms.
- apply the basic number theory required for cryptographic applications as well as various cryptographic systems.
- manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm.
- manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie-Hellman, and DSA algorithms.
- describe the requirements and mechanisms for identification and authen- tication. p> 6. explain and compare the various access control policies and models as well as the assurance of these models.
- discuss the characteristics of typical security architectures, including multi-level security systems.
- contrast the criteria of evaluating secure information systems, including evaluation of secure operating systems and secure network systems.
- compare and contrast database security issues and solutions, including models, architectures, and mechanisms for database security.
- examine and apply network and distributed systems security issues and solutions, including authentication, key distribution, firewalls, and network security protocols.
- identify and describe program security issues, including virus, worm, and logical bombs.
- describe the basic concepts and general techniques in security auditing and intrusion detection.
- examine the issues related to administration security, physical security, and program security.
- determine appropriate mechanisms for protecting information systems ranging from operating systems to database management systems and to applications.
See Course Listings