CFR3311

Computer security

Y Zheng

6 points
* 4 hours per week
* Second semester
* Peninsula
* Prerequisites: CFR1124, CFR1125 or equivalent
* Prohibitions: COT2200

Objectives At the completion of this subject students should be able to identify the threats to the security of an information system, including worms and viruses; be able to differentiate among the range of security techniques and know how to use them; understand and assess the performance of commonly used security algorithms and protocols; and describe a range of access control policies and select appropriate mechanisms to implement each of the policies.

Synopsis This subject provides students with the knowledge and skills necessary to identify security problems which may arise in an information system and to explore measures that may be used to prevent or resolve such security problems. Topics covered include: security threats and counter-measures in a computing and communications system; standard security techniques including private key and public key ciphers, stream ciphers, digital signatures, one-way hash functions, entity authentication and identification, and smart cards; firewalls and secure computer networks; database security; security in electronic commerce including EDI and electronic mail; computer viruses; protection of computer software.

Assessment Examination (3 hours): 50%
* Practical work: 50%

Prescribed texts

Pfleeger C Security in computing Prentice-Hall, 1989

Recommended texts

Castano S and others Database security Addison-Wesley, 1995
Ford W Computer communications security Prentice-Hall, 1994

Back to the Information Technology Handbook, 1998
Handbook Contents | University Handbooks | Monash University


Published by Monash University, Australia
Maintained by wwwdev@monash.edu.au
Approved by M Rambert, Faculty of Information Technology
Copyright © Monash University 1997 - All Rights Reserved - Caution