Course Code: | CSC109S2 |
Course Title: | Introduction to Computer Security and Cryptography |
Credit Value: | 02 |
Core/Optional: | core |
Hourly Breakdown: | Theory | Practical | Independent Learning |
30 | — | 70 |
Objectives: | Introduce Computer security principles and cryptography, and analyse the need of Public key infrastructure and its applications |
Intended Learning Outcomes: | - Describe the concepts of computer security and cryptography
- Explain notions of threat, vulnerability, and attacks
- Utilise different symmetric key and public key encryption algorithms
- Discuss the importance of Public-key Infrastructure and its applications
|
Contents: | - Foundations of computer security: introduction to computer security and cryptography
- Concepts of risks, threats, vulnerabilities and types of attacks: computer security attacks, types, attacker goals, motivations (such as underground economy, digital espionage, cyberwarfare, insider threats, hacktivism, advanced persistent threats), examples of malware, organizational vulnerabilities and threats
- Key security properties: confidentiality, integrity and availability
- Concepts of authentication, authorization and access control: OSI security architecture, security services and security mechanisms
- Classical encryption techniques: Symmetric key ciphers, substitution techniques, transposition techniques, other classical encryption tools, key management techniques
- Public-key cryptography and its applications: introduction to PKI, hash functions, digital signatures and digital certificates, secure web browsing, e-commerce, secure authentication
|
Teaching/Learning Methods: | Lectures, Class discussion, Recitation oral questions, Lecture demonstration, Small group discussions, Use of slides, Textbook assignments. |
Assessment Strategy: | - In-course Assessments —————————————30%
- End-of-course Examination ———————————-70%
|
References: | - W. Stallings, Cryptography and Network Security: Principles and Practice, 6th Ed., 2013.
- J. Katz and Y. Lindell. Introduction to Modern Cryptography, 2nd Ed., 2014.
|