(This page is under construction)
A comprehensive study of security vulnerabilities in computer and networking systems and the basic techniques for developing secure applications and practicing safe computing. Topics including Common attacking techniques such as buffer overflow, Trojan, virus, etc. UNIX, Windows and Java security. Conventional encryption. Hashing functions and data integrity. Public-key encryption (RSA, Elliptic-Curve). Digital signature. Watermarking for multimedia. Security standards and applications. Building secure software and systems. Management and analysis of security. Legal and ethical issues in computer security.
Information security has grown into a rich and diversified area. But I believe that it is very important for students to learn fundamental issues first. It is very appropriate for students to take this couese as the FIRST one to learn security. It covers all the basic areas of security and will not only focus on a particular domain so students by taking this course will have an invaluable broad knowledge of security. This course involves theories, algorithms and programming of cryptography (encryption/decryption), computer systems security, secure software, and basic network security, etc. After taking this course, students will have the knowledge to study more specialized security issues such as Network Security.
My style of graduate teaching is to give students motivations and directions. Homework and projects play an inportant role of the course work. A few interesting homework and programming projects will be given, and term projects will be developed through a team work. Students will give presentations in class. You will find that this course will be quite different from other grad. courses offered in UTD. And I am sure that you will enjoy it. Feel free to come to chat with me at anytime for anything.
The students should know operating systems. If you have any questions, let me know.
Revised by Edwin Sha - 2008.