Information is an important strategic and operational corporate asset. Computers and computer networks, which are increasingly being used for storing and retrieving information, consequently need to have adequate security measures that can safeguard sensitive information.
This course will introduce the students to the rapidly emerging area of computer security. The topics that will be covered in this course are basic security concepts, access control models, multilevel security, viruses, Trojan horses and worms, trusted computer systems evaluation, cryptography, authentication and identification and security protocols.
The students taking this course will have knowledge of the fundamental principles of computer security. They will be in a position to understand the many different threats that endanger information processing systems and will be able to formulate policies and implement defenses against these threats. The knowledge acquired will allow them to be successful in computer security related careers. It will also allow them to pursue more advanced studies in information systems security.
This course can be applied toward:
CS 356 (Systems Security) or CS 455 (Introduction to Distributed Systems).
Textbooks and Materials
There is no required text book. Instructor hands out lecture notes as well as an audio recording of the on-campus lecture.
Dr. Indrakshi Ray
Dr. Indrakshi Ray is a Professor of Computer Science at Colorado State University, where she teaches classes in Cyber Security and Privacy and also conducts foundational research in these areas.