Loading...

Course Description

History and examples of computer crime. Security policies and mechanisms. Access control models. Implementation and usability issues. Physical security. Authentication technologies. Operating system security. Encryption algorithms and protocols. External and internal firewalls. Software flaws and malware. Ethical issues in computer security. Sample privacy noncompliance litigation cases, Social implications of computing networked communication.

Requisites

Prerequisites: CCPS 393
Loading...

Thank you for your interest in this course. It is not scheduled for the current academic year.

Use our Course Search to find courses that are offered this year.