Computer Security CSC 519

In this course, we will discuss the Threats and vulnerabilities - Identification and authentication - Access control -
Intrusion detection - Encryption and privacy - Security policies and their evaluation.

 

Course Materials