SEC 305 Computer Security
This course provides a solid theoretical foundation, as well as real-world examples, for understanding computer security. Fundamental theoretical results, foundational models, and salient examples will be covered. Topics covered include: Log files, the auditing process; log on credentials and the authentication process; Security and threat models; risk analysis; auditing, access control/protection mechanisms; security architecture; and security evaluation.