The course provides an in-depth study of cryptographic techniques and their role in practical computer systems and applications. It covers the algorithms for symmetric and asymmetric encryption, hash functions, and pseudo random number generation; and the protocols to achieve practical security objectives such as confidentiality, authentication, data integrity, non-repudiation. Associated protocols such as key distribution and public key infrastructure systems will also be covered.
This course is designed to provide the foundation for understanding the key issues associated with protecting information assets. It will also help to determine the levels of protection and response to security incidents, and to design a consistent, reasonable information security system with appropriate intrusion detection and reporting features.
The course of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology are also included.
The course will enable students to understand issues associated with the nature of cybercrime, digital evidence, detection methods and proof, in a variety of digital forensic contexts, including computers, networks and portable digital devices. Users in this course will be given a background of data collection, data examination, data analysis and data reporting of data received through different digital media.