This course provides a one-semester overview of information security. It is designed to help students with
prior computer and programming knowledge — both undergraduate and graduate — understand this important
priority in society today. The technical content of the course gives a broad overview of essential concepts and
methods for providing and evaluating security in information processing systems (operating systems and
applications, networks, protocols, and so on).
In addition to its technical content, the course touches on theWhy Take This Course?
importance of management and administration, the place information security holds in overall business risk,
social issues such as individual privacy, and the role of public policy.
The course will be organized around a few broad themes:
• Foundations: security mindset, essential concepts (policy, CIA, etc.)
• Software security: vulnerabilities and protections, malware, program analysis
• Practical cryptography: encryption, authentication, hashing, symmetric and asymmetric crypto
• Networks: wired and wireless networks, protocols, attacks and countermeasures
• Applications and special topics: databases, web apps, privacy and anonymity, voting, public policy
The course is divided into three parts:
Mustaque Ahamad and Wenke Lee