This course covers the security of users, individual computer systems, including personal computers, smart cards and embedded platforms. The course starts with considerations of common frauds on the Internet and the related ecosystem, security of widely used computer platforms and user authentication. Then, topics such as physical-layer attacks and tamper resistant hardware are discussed. Finally, the course ends with a set of selected security topics like biometrics, computer forensics, and Bitcoin.
By the end of the course, students will be able to:
- Understand how computer systems are compromised
- Understand how to defend against those attacks.
- Understand and implement basic principles for secure systems design.
- List basic security solutions and models; explain concepts for confidentiality, integrity and availability.
- Classify and describe common attacks and countermeasures for host, network and web security.
- Analyze and apply offensive and defensive software to attack and defend systems.
- Design security solutions to achieve specific security goals in a system.
- Evaluate the security of existing networked systems.
Assignments, Midterm and Final Exam