- 530 – Advanced Protocols and Network Security
- 531 – Information System Security
- 532 – Information Warfare
- 533 – Cryptography
- 534 – Legal & Ethical Issues in Information Assurance
- 535 – Steganography and Watermarking
- 536 – Computer and Network Forensics
- 537 – Wireless Network Security
- 592 – Seminar in Information Assurance
- 632 – Information Assurance Capstone Design
Detailed examination of networking standards, protocols, and their implementation. TCP/IP protocol suite, network application protocols, IP routing, network security issues. Emphasis on laboratory experiments. Major Teaching Department: CprE
Computer and network security basic cryptography, security policies, multilevel security models, attack and protection mechanisms, legal and ethical issues. Major Teaching Department CprE. Cross-listed with CprE.
Computer system and network security implementation, configuration, testing of security software and hardware, network monitoring. Authentication, firewalls, vulnerabilities, exploits, countermeasures. Ethics in information assurance. Emphasis on laboratory experiments. Major Teaching Department CprE. Cross-listed with CprE.
Basic concepts of secure communication, DES and AES, public-key cryptosystems, elliptic curves, hash algorithms, digital signatures, applications. Relevant material on number theory and finite fields. Major Teaching Department MATH. Cross-listed with MATH, CprE.
Legal and ethical issues in computer security. State and local codes and regulations. Privacy issues. Major Teaching Department PolS. Cross-listed with CprE, PolS.
Basic principles of steganography and watermarking. Algorithms based on spatial domain approaches, transformations of data, statistical approaches. Techniques for images, video, and audio data. Communications models for data hiding. Analysis, detection and recovery of hidden data. Military, commercial and e-commerce applications. Known theoretical results. Software packages for data hiding. Social and legal issues, case studies, and digital rights management issues that affect technological development of steganography and watermarking. Current developments in the area. Major Teaching Department MATH. Cross-listed with MATH, CprE.
Fundamentals of computer and network forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity and pseudonymity, privacy-protection techniques, cyber law, computer security policies and guidelines, court testimony and report writing, and case studies. Emphasis on hands-on experiments. Major Teaching Department CprE. Cross-listed with CprE.
Introduction to the physical layer and special issues associated with security of the airlink interface. Communication system modeling, wireless networking, base stations, mobile stations, airlink multiple access, jamming, spoofing, signal intercept, wireless LANS and modems, cellular, position location, spread spectrum, signal modeling, propagation modeling, wireless security terminology.
Projects or seminar in Information Assurance. Note: This course is only available for on-campus students when offered.
Capstone design course which integrates the security design process. Design of a security policy. Creation of a security plan. Implementation of the security plan. The students will attach each other’s secure environments in an effort to defeat the security systems. Students evaluate the security plans and the performance of the plans. Social, political and ethics issues. Student self-evaluation, journaling, final written report, and an oral report. Major Teaching Department InfAs. Cross-listed with CprE.