<< >> ^

CFR3311

Computer security

Y Zheng

6 points
* 4 hours per week
* Second, summer semester
* Peninsula
* Prerequisites: CFR1124, CFR1125 or equivalent
* Prohibitions: COT2200

Objectives At the completion of this subject students should be able to identify the threats to the security of an information system, including worms and viruses; be able to differentiate among the range of security techniques and know how to use them; understand and assess the performance of commonly used security algorithms and protocols; and describe a range of access control policies and select appropriate mechanisms to implement each of the policies.

Synopsis This subject provides students with the knowledge and skills necessary to identify security problems which may arise in an information system and to explore measures that may be used to prevent or resolve such security problems. Topics covered include: security threats and counter-measures in a computing and communications system; standard security techniques including private key and public key ciphers, stream ciphers, digital signatures, one-way hash functions, entity authentication and identification, and smart cards; firewalls and secure computer networks; database security; security in electronic commerce including EDI and electronic mail; computer viruses; protection of computer software.

Assessment Examination (3 hours): 50%
* Practical work: 50%

Prescribed texts

Pfleeger C Security in computing Prentice-Hall, 1989

Recommended texts

Castano S and others Database security Addison-Wesley, 1995

Ford W Computer communications security Prentice-Hall, 1994


<< >> ^
Handbook Contents | Faculty Handbooks | Monash University
Published by Monash University, Clayton, Victoria 3168
Copyright © Monash University 1996 - All Rights Reserved - Caution
Authorised by the Academic Registrar December 1996