This week we are going to examine a mainstay of digital security: cryptography. We
have a lot to do!
Consider our TCO for the week: TCO C - Given a computer network for data
transmission, identify and analyze the possibilities for loss or mod
Note: Theres a covert channel in this lecture. Can you find it before it is revealed?
Iatrogenic Software Security Problems
Iatrogenic is a great word except for the fact that it really applies only in a medical
context: harm caused by the ph
Can you define information security? I hope not; it doesn't exist.
Or does it?
One could argue that security, as a quantifiable and absolute state, doesn't exist. However, if
security is a perception a sense that oneself or, as is our focus in
Principles of Information Security and Privacy
This course provides a broad overview of security in information systems.
Covered are various aspects of securi