CS 461
CS 461 - Computer Security I
Spring 2025
Title | Rubric | Section | CRN | Type | Hours | Times | Days | Location | Instructor |
---|---|---|---|---|---|---|---|---|---|
Computer Security I | CS461 | ALG | 70797 | LCD | 4 | 1230 - 1345 | T R | 1404 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | CS461 | ALU | 48199 | LCD | 4 | 1230 - 1345 | T R | 1404 Siebel Center for Comp Sci | Ling Ren Adam Bates |
Computer Security I | CS461 | AY2 | 63508 | DIS | 0 | 1300 - 1350 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | CS461 | AY3 | 63509 | DIS | 0 | 1400 - 1450 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | CS461 | AY4 | 63510 | DIS | 0 | 1500 - 1550 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | CS461 | AY5 | 63511 | DIS | 0 | 1600 - 1650 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | ECE422 | ALG | 70798 | LCD | 4 | 1230 - 1345 | T R | 1404 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | ECE422 | ALU | 48201 | LCD | 4 | 1230 - 1345 | T R | 1404 Siebel Center for Comp Sci | Ling Ren Adam Bates |
Computer Security I | ECE422 | AY2 | 63515 | DIS | 0 | 1300 - 1350 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | ECE422 | AY3 | 63516 | DIS | 0 | 1400 - 1450 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | ECE422 | AY4 | 63517 | DIS | 0 | 1500 - 1550 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
Computer Security I | ECE422 | AY5 | 63518 | DIS | 0 | 1600 - 1650 | W | 2406 Siebel Center for Comp Sci | Ling Ren |
See full schedule from Course Explorer
Documents
Official Description
Course Director
Text(s)
Computer Security: Principles and Practice, 2nd. Ed., by William Stalling and Lawrence Brown
Learning Goals
Assess and address Security and Privacy (S&P) issues for policy and humans. That is, characterize and classify the threats based on human conformance to policy and evaluate the effectiveness of a range of countermeaures. (1)
Provide S&P risk analysis for basic scenarios based on core principles, specifically the Confidentiality, Integrity, Availability (CIA) requirements. (1)
Apply cryptographic hashes, pseudorandom generators, symmetric, and asymmetric cryptography with appropriate tradeoffs. (1,2,3)
Evaluate options for authentication based on secrets, tokens, and biometrics. (1)
Understand network, application, and systems security. (1,2)
Formulate access control models for basic situations. (1,2)
Write and mitigate malicious code and characterize basic means of its propagation. (1,2,3)
Assess the threat of basic Denial of Service (DoS) attacks. (1)
Provide network securty protections using firewalls and IDSs. (1,2)
Assess threats based on physical layer. (1)
Apply legal and ethical rules for S&P. (4)
Topic List
Human issues in S&P
S&P risk assessment
History of cryptography
Symmetric key encryption
Asymmetric key encryption
Systems security
Database security
Application security
Web application security
Network security
Digital signatures
Cryptology
Authentication
Authorization
Malicious code
Threat Modeling
DoS
Intrusion Detection & Firewalls
Legal and Ethical Isssues in S&P
Trusted Operating systems
Evaluation and Auditing
Physical layer security threats
Required, Elective, or Selected Elective
Selected Elective.