With the multiplication of tasks that are performed on computers and the advent of globalization of computing in general, the topic of computer security becomes more and more important. We see in this course what is computer security, especially as it relates to the protection of information stored on the computers and exchanged between computers
On completing this course the student should be able to:· Describe the functioning of various types of malicious code, such as viruses, worms, trapdoors.· Enumerate set programming techniques that enhance security.· Explain the various controls available for protection against internet attacks, including authentication, integrity check, firewalls, and intruder detection systems.· Describe the different ways of providing authentication of a user or program.· Describe the mechanisms used to provide security in programs, operating systems, databases and networks.· Describe the background, history and properties of widely-used encryption algorithms such as DES, AES, and RSA.· Describe legal, privacy and ethical issues in computer security.· List and explain the typical set of tasks required of a system security administrator.