{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

set301 - Computer and Communications Security COMP4631...

Info icon This preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 Computer and Communications Security COMP4631 Cunsheng Ding [email protected] http://www.cs.ust.hk/faculty/cding
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 Outline of this Lecture Brief introduction to COMP4631 Physical security: an important step towards understanding computer security
Image of page 2
C. Ding - COMP4631 - L01 Course Introduction
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 Course Structure Core theory encryption authentication digital signature Practice Windows NT security Unix security Distributed system security Network security Web security
Image of page 4
C. Ding - COMP4631 - L01 Course Structure & Grading Lecture Tutorial x 3 assignments, 1 quiz, 1 exam, attendance Grading:
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 Main Topics • Computer security: an introduction • Conventional cryptosystems • Public-key cryptosystems • Key management • Hash functions, authentication • Digital signature, identification • Access control • Unix security • Windows NT security • Distributed system security • Network security
Image of page 6
C. Ding - COMP4631 - L01 Main Topics ctd. • IP security • Email security • WWW security
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 Reference Books • Behrouz A. Forouz, Cryptography and Network Security, McGraw Hill, 2008. D. Gollmann, Computer Security, John Wiley & Sons, 1999. • A. Salomaa, Public-key Cryptography, Springer- Verlag, 1996 (2/e)
Image of page 8
C. Ding - COMP4631 - L01 On completion of this course you will be able to: 1) Describe the security mechanisms which are generally used to implement security policies. a) Data confidentiality mechanisms b) Data integrity mechanisms c) Authentication mechanisms Learning Outcomes (I)
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 On completion of this course you will be able to: 2) Provide examples of the implementation of such mechanisms within particular operating systems. a) Implementation of file protection mechanisms (read, write, etc) in Unix and Windowns NT. b) Implementation of access control mechanisms in Unix and Windows NT. c) Implementation of authentication mechanisms in Unix and Windows NT. Learning Outcomes (II)
Image of page 10
C. Ding - COMP4631 - L01 On completion of this course you will be able to: · Display a breadth of knowledge of the security vulnerabilities affecting computer systems. Learning Outcomes (III)
Image of page 11

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 Warning ! Prerequisites: Operating systems, Computer communication networks, Discrete mathematics
Image of page 12
C. Ding - COMP4631 - L01 Important Information Take this course only if you have time to visit lectures, to work out assignments independently, and most importantly to have good math capability and a background in operating systems and computer networks.
Image of page 13

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01 Questions?
Image of page 14
C. Ding - COMP4631 - L01 Physical Security: The first step towards understanding computer security
Image of page 15

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
C. Ding - COMP4631 - L01
Image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern