Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols, IP routing, network security issues. Emphasis on laboratory experiments. Major Teaching Department: CPR E
3InfAs530Cpr E 381
3InfAs531Cpr E 489 or 530 or Com S 586 or MIS 535
Computer and network security basic cryptography, security policies, multilevel security models, attack and protection mechanisms, legal and ethical issues. Major Teaching Department CPR E. Cross-listed with CPR E.
3InfAs532Cpr E 531
Computer system and network security implementation, configuration, testing of security software and hardware, network monitoring. Authentication, firewalls, vulnerabilities, exploits, countermeasures. Ethics in information assurance. Emphasis on laboratory experiments. Major Teaching Department CPR E. Cross-listed with CPR E.
3InfAs533Math 301 or Cpr E 310 or Com S 330
Basic concepts of secure communication, DES and AES, public-key cryptosystems, elliptic curves, hash algorithms, digital signatures, applications. Relevant material on number theory and finite fields. Major Teaching Department MATH. Cross-listed with MATH, CPR E.
3InfAs534Graduate classification, Cpr E or InfAs 531
Legal and ethical issues in computer security. State and local codes and regulations. Privacy issues. Major Teaching Department POL S. Cross-listed with CPR E, POL S.
3InfAs535Cpr E 531 or E E 524 or Math 533/Cpr E 533/InfAs 533
Basic principles of steganography and watermarking. Algorithms based on spatial domain approaches, transformations of data, statistical approaches. Techniques for images, video, and audio data. Communications models for data hiding. Analysis, detection and recovery of hidden data. Military, commercial and e-commerce applications. Known theoretical results. Software packages for data hiding. Social and legal issues, case studies, and digital rights management issues that affect technological development of steganography and watermarking. Current developments in the area. Major Teaching Department MATH. Cross-listed with MATH, CPR E.
3InfAs536Cpr E 381 and Cpr E 489 or 530
Fundamentals of computer and network forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity and pseudonymity, privacy-protection techniques, cyber law, computer security policies and guidelines, court testimony and report writing, and case studies. Emphasis on hands-on experiments. Major Teaching Department CPR E. Cross-listed with CPR E.
3CprE537Credit or enrollment in 489 or 530
Introduction to the physical layer and special issues associated with security of the airlink interface. Communication system modeling, wireless networking, base stations, mobile stations, airlink multiple access, jamming, spoofing, signal intercept, wireless LANS and modems, cellular, position location, spread spectrum, signal modeling, propagation modeling, wireless security terminology.
1InfAs592Permission of instructor
Projects or seminar in Information Assurance.
3InfAs632531, 532, 534
Capstone design course which integrates the security design process. Design of a security policy. Creation of a security plan. Implementation of the security plan. The students will attach each other's secure environments in an effort to defeat the security systems. Students evaluate the security plans and the performance of the plans. Social, political and ethics issues. Student self-evaluation, journaling, final written report, and an oral report. Major Teaching Department INFAS. Cross-listed with CPR E.