Computer Security
This course is intended to give an in-depth understanding of computer system security. Security encomp asses hacker challenges, malicious break-ins and insider threats. Topics include: Basic Encryption and Decryption - Rivest-Shamir-Adelman (RSA) Encryption, El Gamal and Digital Signature Algorithms, Hash Algorithms, Kerberos; Program Security - Virus, Trojan Horse, Malicious Code, Covert Channels; Design of Trusted OS; Network Security - Firewalls, Tripwires; Intrusion Detection - Audit Trail-Based Schemes, Concurrent Intrusion Detection.
None presently available.
Ph.D.:
This course fulfills one Software and Information Systems Core Course requirement.
M.S.:
This course fulfills one Software and Information Systems Core Course requirement.
CSE531; permission of instructor
| Semester | Section | Title | Instructor | Credit Hours | Enrolled |
|---|---|---|---|---|---|
| Fall 2013 | LEC | Computer Security | Dr. Shambhu Upadhyaya | 3 | 30/96 |
| Fall 2012 | LEC | Computer Security | Dr. Shambhu Upadhyaya | 3 | 78/96 |
| Fall 2011 | LEC | Computer Security | Dr. Shambhu Upadhyaya | 3 | 60/96 |
| Fall 2010 | LR | Computer Security | Dr. Shambhu Upadhyaya | 3 | 64/66 |
| Fall 2009 | LR | Computer Security | Dr. Shambhu Upadhyaya | 3 | 58/66 |
| Fall 2008 | LR | Computer Security | Dr. Shambhu Upadhyaya | 3 | 52/52 |
| Fall 2007 | LR | Computer Security | Dr. Shambhu Upadhyaya | 3 | 31/50 |
| Fall 2006 | LR | Computer Security | Dr. Shambhu Upadhyaya | 3 | 29/50 |
| Fall 2004 | LR | Computer Security | Dr. Shambhu Upadhyaya | 3 | 41/90 |
| Fall 2004 | LR | Computer Security | Dr. Shambhu Upadhyaya | 3 | 0/10 |
| Fall 2003 | LEC | Computer Security | Dr. Shambhu Upadhyaya | 3 | 45/90 |
| Fall 2002 | LEC | Computer Security | Dr. Shambhu Upadhyaya | 3 | 74/78 |