【文章內(nèi)容簡(jiǎn)介】
ay make certain aspects of security important and how an entire system might fit together. ? Standards and evaluation criteria [690OPT7] : Over the last few years, a variety of securityrelated standards have been produced by international standards bodies. This module examines some of the most important of these standards in detail. In doing so it illustrates how international standards now cover many aspects of the analysis and design of secure systems. The material covered also puts certain other aspects of the degree course in a more structured setting. The module also covers existing security evaluation criteria, the current process for evaluating secure systems, and guidelines for managing IT security University of London ? Advanced cryptography [690OPT8] : This module follows on from the introductory cryptography module. In that module cryptographic algorithms were introduced according to the properties they possessed and how they might fit into a larger security architecture. In this unit we look inside some of the most popular and widely deployed algorithms and we highlight design and cryptanalytic trends over the past twenty years. This course is, by necessity, somewhat mathematical and some basic mathematical techniques will be used. However, despite this reliance on mathematical techniques, the emphasis of the module is on understanding the more practical aspects of the performance and security of some of the most widely used cryptographic algorithms. University of London ? Database security [690OPT9]: This module covers several aspects of database security and the related subject of concurrency control in distributed databases. We will discuss methods for concurrency control and failure recovery in distributed databases and the interaction between those methods and security requirements. We will also examine how access control policies can be adapted to relational and objectoriented databases. University of London ? Information crime [690OPT10] : This module plements other modules by examining the subject from the criminal angle and presenting a study of puter crime and the puter criminal. We will discuss its history, causes, development and repression through studies of surveys, types of crime, legal measures, and system and human vulnerabilities. We will also examine the effects of puter crime through the experiences of victims and law enforcement and look at the motives and attitudes of hackers and other puter criminals. University of London ? Project [6900011] : The project is a major individual piece of work. It can be of academic nature and aim at acquiring and demonstrating understanding and the ability to reason about some specific area of Information Security. Alternatively, the project work may document the ability to deal with a practical aspect of Information Security Stanford ? ? Security Lab in the Computer Science Department ? Courses: ?CS155: Computer and Network Security. ?CS255: Introduction to Cryptography and Computer Security. ?CS259: Security Analysis of Network Protocols ?CS355: Topics in Cryptography. ?CS99J: Sophomore seminar: Computer security and privacy. ?CS55N: Freshman seminar: Ten Ideas in Computer Security and Cryptography. (講座) Oxford ? Computer Security:融入計(jì)算機(jī)系統(tǒng)的設(shè)計(jì)開(kāi)發(fā),形成實(shí)踐能力 Oxford ? Security Principles (SPR) This course bines a treatment of the fundamental principles of cryptography and security protocols with a practical treatment of current best practice. It explains the need for puter security, and the scope of the available technical solutions。 presents techniques for evaluating security solutions。 and provides an overview of the current leading technologies and standards in the security arena. Oxford ? Security Risk Analysis and Management (RIS) Security is a property of an entire system in context, rather than of a software product, so a thorough understanding of system security risk analysis is necessary for a successful project. This course introduces the basic concepts and techniques of security risk analysis, and explains how to manage security risks through the project lifecycle. Participants should have a basic understanding of topics in security, as provided by the Security Principles (SPR) course. ? People and Security (PAS) A very high proportion of failures in security can be attributed to misunderstanding, misinformation, or failure to grasp the importance of the processes individuals are expected to follow. This course draws on work from humanputer interaction, and more widely from psychology, relating the issues raised back to hard techn