Professor |
K.P. Chow
|
Teaching assistant |
Yan Qi Quincy Hui
|
Syllabus |
The aim of the course is to introduce different methods of protecting
information and data in the cyber world, including the privacy issue. Topics
include introduction to security; cyber attacks and threats; cryptographic
algorithms and applications; network security and infrastructure.
Mutually exclusive with: ICOM6045 Fundamentals of e-commerce security |
Introduction by Professor |
Information is an invaluable asset of an
organization. An organization may suffer huge financial loss or even be hold
legally liable if it does not take appropriate steps to protect its
information in the cyber world. Cyber security plays a vital role in
protecting information. It is important to understand cyber security is a
process which technology is only a means to an end. Furthermore, attempts to
achieve 100% security are impossible. Instead the key is to reduce cyber
security risks that an organization faces to an acceptable level. To achieve
this, the risk management cycle is the common approach that cyber security
professionals use. It is also important to understand that as Bruce Schneier, a respected cryptographer, pointed out functionality does not
guarantee security. Furthermore, you cannot just choose an algorithm,
implement it and test that it work, then assume you have a secure product. Sound understandings of cryptographic algorithms and security protocol
analysis are important in this aspect. The course aims to clear up some of
these misconceptions by discussing cyber security management best practices,
cryptographic algorithms, and security protocol analysis. Furthermore, the
course will also discuss analytics techniques and the application of such
techniques to augment cyber security programs. Please note that this course
is not an information security management per se course, information
security analysis techniques will be covered and students are expect to be
able to apply this to perform case analysis. |
Learning Outcomes |
|
Pre-requisites |
Ideally, students are expected to have basic knowledge and skills that
are equivalent to
- an undergraduate discrete mathematics course such as those in the
MIT course "Mathematics for Computer Science (MIT course number 6.042J /
18.062J)". More information is available at
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-042j-mathematics-for-computer-science-fall-2010/index.htm
and the textbook of this course is available at
https://courses.csail.mit.edu/6.042/spring17/mcs.pdf;
- an undergraduate course in basic statistics such as those in the MIT
course "Applied Statistics (MIT course number 15.075)". More information
is available at
http://dspace.mit.edu/bitstream/handle/1721.1/72947/15-075-spring-2003/contents/index.htm;
and
- an introductory programing course such as those in the MIT course
"Introduction to Computer Science and Programming Using Python (MIT
course number 6.0001)". More information is available at
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/
Please note that review of the essential topics in these three areas will
be provided in class.
|
CCompatibility |
Students who have taken "ICOM6045
Fundamentals of e-commerce security" should not be allowed to take COMP7906. |
Topics covered |
|
Assessment |
|
Course materials |
Prescribed textbook:
- William Stallings, Cryptography and Network Security:
Principles and Practice, 7th edition, Prentice Hall.
Recommended readings:
- Scott Barman, Writing Information Security Policies, 1st
edition, New Riders Publishing, 2002.
- Matt Bishop, Computer Security: Art and Science, 1st
edition, Addison-Wesley Professional, 2002.
- Charles J. Brooks, Christopher Grow, Philip Craig,
Donald Short, Cybersecurity Essentials, 1st edition, Sybex,
2018.
- Niels Ferguson, Bruce Schneier, Practical Cryptography,
1st edition, John Wiley & Sons, 2003.
- Ivan Palomares Carrascosa (editor), Harsha Kumara
Kalutarage (editor), Yan Huang (editor), Data Analytics and
Decision Support for Cybersecurity: Trends, Methodologies
and Applications, 1st edition, Springer, 2017.
- Dieter Gollmann, Computer Security, 3rd edition, John
Wiley & Sons, 2006.
- Andrew Jaquith, Security Metrics: Replacing Fear,
Uncertainty, and Doubt, 1st edition, Addison-Wesley
Professional, 2007.
- Anne Kohnke and Ken Sigler, Implementing cybersecurity:
A Guide to the National Institute of Standards and
Technology Risk Management Framework, 1st edition, Auerbach
Publications, 2017.
- Thomas R. Peltier, Information Security Risk Analysis,
3rd edition, Auerbach Publications, 2005.
- B. Schneier, Applied Cryptography: Protocols,
Algorithms, and Source Code in C, 2nd edition, John Wiley &
Sons, 1995.
- Mark Talabis and Robert McPherson, Information Security
Analytics: Finding Security Insights, Patterns, and
Anomalies in Big Data, 1st edition, Syngress, 2014.
|
Session dates |
|
Add/drop |
1 September, 2022 - 21 October, 2022 |
Maximum class size |
84 |