Course Description

History and examples of computer crime. Security policies and mechanisms. Access control models. Implementation and usability issues. Physical security. Authentication technologies. Operating system security. Encryption algorithms and protocols. External and internal firewalls. Software flaws and malware. Ethical issues in computer security. Sample privacy noncompliance litigation cases, Social implications of computing networked communication.


Prerequisites: CCPS 393

Thank you for your interest in this course. It is not scheduled for the current academic year.

Use our Course Search to find courses that are offered this year.