CSE509 Computer Systems Security (2014 Fall)
- Lecturer: David (Bong Jun) Choi
- Time: M,W 10:30-11:50, Academic Building 227
- Office Hours: T, Th 16:00-17:00, or by appointment
- Contact: +82 (32) 626 1216 / firstname.lastname@example.org / Academic Building 423
- This lecture covers major concepts and techniques in computer security. We focus primarily on securing a single host. We will also cover network security issues whenever relevant. The course material is roughly organized as follows: computer security technologies and principles, software security, trusted systems, management issues, and cryptographic algorithms.
- Introduction: Computer Security Concepts, Requirements, Architecture, Trends, and Strategy
- Cryptographic Tools: Symmetric-Key Encryption, Message Authentication, Public-Key Encryption, Random Numbers
- User Authentication: Passwords, Tokens, Biometric, Remote
- Access Control: Principles, Rights
- Database Security: Management Systems, Relational Databases, Access Control, Statistical Encryption, Cloud Security
- Malicious Software: Viruses, Worms, SPAM, Trojans, Zombie, Bots, Spyware, Phishing, Backdoors, Rootkits
- Denial-of-Service Attacks: Flooding, Distributed Dos, Defenses
- Intrusion Detection: Host-based, Distributed, Network-based, Honeypots
- Firewalls and Intrusion Prevention Systems: Types of Firewalls, Intrusion Prevention Systems
- Software Security: Buffer Overflow, Writing Safe Program Code, Interacting with OS and other Programs
- Operating System Security: Planning, Hardening, Application Security, Linux/Unix Security, Windows Security, Virtualization Security
- Security Management: Risk Assessment, Risk Analysis, IT Security Planning
- Physical and Infrastructure Security: Threats, Preventive and Mitigation Measures, Recovery, Integration of Physical and Logical Security
- Cryptographic Algorithms: Symmetric Encryption (DES, AES, CBC, and etc.), Public-Key Cryptography (RSA, HMAC, Diffie-Hellman, and etc.)
- Network Security: Security Standards, Internet Authentication, Wireless Network Security
- William Stallings, Lawrie Brown, “Computer Security: Principles and Practice”, 2nd edition (November 19, 2011), ISBN-10: 0132775069.
- Other References: (1) Matt Bishop, “Computer Security: Art and Science”, Addison-Wesley Professional, 2002. (2) Ross Anderson, “Security Engineering”, 2nd edition, Wiley, 2008.
- Note: Reading list of materials (tutorials, papers, and standards) will be available on Blackboard.
- Midterm Exam: 25% (in-class)
- Final Exam: 35% (cumulative)
- Term Project: 20% (individual, project report, implementation, presentation)
- Assignments: 10% (about 10 short assignments)
- Paper Reviews: 10% (10~15 paper reviews with a summary and critical comments, 10 minute presentations)