Set your preference
Font Scaling
Default
Page Scaling
Default
Color Adjustment

CS628A - Computer Systems Security

IITK

Prerequisites:

3-0-0-9

Course Contents

Introduction: need and basic goals for computer security, security threats etc. Cryptographic building blocks: Symmetric and asymmetric key cryptography, cryptographic hash functions, digital signature schemes etc., with representative applications for each. Operating System Security: Low level protection mechanisms, access control: models for access control, some confidentiality, integrity, and hybrid models of access control such as Bell La Padula, Biba, Chinese Wall etc., discretionary v/s mandatory access control. Case studies: Java access control policy specifications, SE Linux security model and implementation. Program flaws: Bugs which have security implications such as buffer overflows, race conditions etc. Malicious code: Viruses, worms, Trojan horses; how they work and how to defend against them. Network Security: problems in network security; kinds of attacks, PKI, key exchange protocols, example protocols such as PGP, Kerberos, IPSEC/VPN,SSL, S/MIME etc. Protocol vulnerabilities: examples of protocol vulnerabilities such as in TCP/IP, denial of service attacks etc. Tools for network security such as firewalls and intrusion detection systems. 


 

Topics

Current Course Information

Instructor(s):

Number of sections:

Tutors for each section:

Schedule for Lectures:

Schedule for Tutorial:

Schedule for Labs: