Computer Systems Security: Module Overview

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 9

Computer Systems Security

CT013-3.5-3

Module overview

Prepared by: NOR Prepared on: 21-01-2014


Prerequisite of this module

• Introduction to Software Development or


equivalent
• Object Oriented and Event Driven Programming
or equivalent
• Introduction to C Programming
• Hardware, Software Systems and Networks or
equivalent.

Data Tracing & Evidence Gathering in Computer


CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
The objective of this module is to:

• Contribute to the achievement of the Learning Outcomes specified for the


student’s award at Level 3
• Enable students to further develop their knowledge and skills in relation to
Computer Systems Security
• Develop the ability of students to critically apply the knowledge they gain in
relation to the study of Computer Systems Security
• Further develop lifelong learning skills of independent learning and study in
relation to Computer Systems Security
• Enable students to develop their ability to:
– Critically Analyze
– Innovate and create new approaches to complex problems, situations and opportunities
– Use quantitative skills and draw appropriate conclusions
– Use and innovate ICT relevant to given situations
Data Tracing & Evidence Gathering in Computer
CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
Learning outcome

1. Explain the principles and concepts involved in


the securing of computer systems both stand-
alone and networks based.
2. Specify, design and justify the design and
implementation decisions of an exemplar
component of a security system.
3. Critically evaluate various techniques used in
exemplar security systems.

Data Tracing & Evidence Gathering in Computer


CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
Topics we will cover

• Types of threat
• Protection and detection mechanism
• Cryptography Key Management
• Operating system security
• Access Controls
• Security Policy Models
• Designing trusted OS
• Database security
• Administering Security
• Privacy in Computing
• Physical Security
Data Tracing & Evidence Gathering in Computer
CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
What support is available for you

• Consultation hours
• Change weekly. Check the system
• Email
• abdulaleem@apu.edu.my
• Mobile:
• 0172376371
• Resources
- Essential and additional reading material
- World wide web references

Data Tracing & Evidence Gathering in Computer


CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
How you will be assessed

• A Group In-course weighted at 100%, with


60% of the total contributed by an individual
component

Data Tracing & Evidence Gathering in Computer


CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
Text and reference books

Essential Reading
• Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 3rd edition, 2002,
(ISBN:01303554488)
• Anderson, R, Security Engineering: A Guide to Building Dependable Distrbuted
Systems, Wiley, 2001, (ISBN: 0471389226)
• Bishop, M, Computer Security: Art and Science, Addison Wesley, 2002, (ISBN:
0201440997)
Further Reading
• William Stallings, Cryptography and Network Security, 4th edition (ISBN:
9780131873162)
• Stajano, F, Security for Ubiquitous Computing, Wiley, 2002, (ISBN: 0470844930)
• Pieprzyk, J., T. Hardjono, J. Seberry, J. Pierprzyk, Fundamentals of Computer
Security, Springer-Verlag, 2002, (ISBN: 3540431012)

Data Tracing & Evidence Gathering in Computer


CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
Question and Answer session

Q&A

Data Tracing & Evidence Gathering in Computer


CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security

You might also like