Topics include basic cryptography; security/threat analysis; access control; auditing; security models; distributed systems security; theory behind common attack and defense techniques. The class will go over formal models as well as the bits and bytes of security exploits.
3 hours of lecture, 1 hour discussion section, and 8 hours of outside preparation.
Please see Prerequisites page.
Restricted to undergraduate students with sophomore, junior, and senior standing within the CS25, CS26, CS27, CS28, and EC26 majors. Graduate students will be allowed as space permits.
One quarter per year, normally in Winter. Please see Tentative Course Offerings page.