Course Outcomes for CSC 474 - Information Systems Security

Upon successful completion of this course, a student will be able to...

  1. list the basic concepts in information security, including security policies, security models, and various security mechanisms.
  2. apply the basic number theory required for cryptographic applications as well as various cryptographic systems.
  3. manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm.
  4. manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie-Hellman, and DSA algorithms.
  5. describe the requirements and mechanisms for identification and authen- tication. p> 6. explain and compare the various access control policies and models as well as the assurance of these models.
  6. discuss the characteristics of typical security architectures, including multi-level security systems.
  7. contrast the criteria of evaluating secure information systems, including evaluation of secure operating systems and secure network systems.
  8. compare and contrast database security issues and solutions, including models, architectures, and mechanisms for database security.
  9. examine and apply network and distributed systems security issues and solutions, including authentication, key distribution, firewalls, and network security protocols.
  10. identify and describe program security issues, including virus, worm, and logical bombs.
  11. describe the basic concepts and general techniques in security auditing and intrusion detection.
  12. examine the issues related to administration security, physical security, and program security.
  13. determine appropriate mechanisms for protecting information systems ranging from operating systems to database management systems and to applications.

See Course Listings

See Course Coordinators