Lecture: 3 hours
Project: 1 hour
Prerequisite: Course ECS 150
Grading: Letter; homework (1/3), project (1/3), final (1/3)
Catalog Description:
Methods of protecting data in computer and communication systems from unauthorized
disclosure and modification. Introduction to mathematical principles of
security with applications to operating systems, database systems and computer
networks. Not open for credit to students who have completed course 253.
Goals:
Basics of computer and information security: foundations, models of confidentiality,
integrity, and hybrid models; basic network security and applications of
cryptography; mechanisms for controlling access and information flow; assurance
of software and systems; auditing, intrusion detection, computer worms and
viruses, and vulnerabilities; applications
Expanded Course Description:
Textbook:
Instructor's notes and journal/conference papers
Paper/Project
Paper surveying a topic in computer security in depth (expected length 20
pages) or a project exploring some aspect of computer security sufficient
to produce a conference paper.
Instructor: M. Bishop
Prepared by: M. Bishop (September 2002)
Overlap Statement:
This course does not have a significant overlap with any other course. There
is some overlap with ECS 153, but that course focuses on the applications
of the theory, whereas ECS 235 focuses on the theory underlying the applications.
ECS 235 covers some of the same general topics as ECS 227 and ECS 228 but
at a more applied and system-related level.
9/02