Professional Documents
Culture Documents
Computer Systems Security: Module Overview
Computer Systems Security: Module Overview
Computer Systems Security: Module Overview
CT013-3.5-3
Module overview
• Types of threat
• Protection and detection mechanism
• Cryptography Key Management
• Operating system security
• Access Controls
• Security Policy Models
• Designing trusted OS
• Database security
• Administering Security
• Privacy in Computing
• Physical Security
Data Tracing & Evidence Gathering in Computer
CT013-3.5-3 Computer System Security Module Overview
CE00360-3 Computer Systems Security
What support is available for you
• Consultation hours
• Change weekly. Check the system
• Email
• abdulaleem@apu.edu.my
• Mobile:
• 0172376371
• Resources
- Essential and additional reading material
- World wide web references
Essential Reading
• Pfleeger, C.P., S. L. Pfleeger, Security in Computing, Prentice Hall, 3rd edition, 2002,
(ISBN:01303554488)
• Anderson, R, Security Engineering: A Guide to Building Dependable Distrbuted
Systems, Wiley, 2001, (ISBN: 0471389226)
• Bishop, M, Computer Security: Art and Science, Addison Wesley, 2002, (ISBN:
0201440997)
Further Reading
• William Stallings, Cryptography and Network Security, 4th edition (ISBN:
9780131873162)
• Stajano, F, Security for Ubiquitous Computing, Wiley, 2002, (ISBN: 0470844930)
• Pieprzyk, J., T. Hardjono, J. Seberry, J. Pierprzyk, Fundamentals of Computer
Security, Springer-Verlag, 2002, (ISBN: 3540431012)
Q&A