CPSC 4660: System Vulnerability Analysis and Auditing

Course Description


The course covers the assessment of systems to discover resources that are susceptible to damage if intrusions and unauthorized access occur. The analysis of system vulnerability, identification of security deficiencies, security measurement, effectiveness and adequacy, and estimation of vulnerability of system resources to potential disaster hazards of unknown origin are also covered. Prerequisites: CPSC 160, 375, and 426 or 444 with grades of C or better.


    Matt Bishop, Introduction to Computer Security, Edition 1, Addison- Wiley, ISBN: 0-321-24744-2

Lecture Notes


Lecture 1: An Overview of Computer Security;     The Need for Security
Lecture 2. Access Control Matrix
Lecture 3. Security Policies
Lecture 4. Confidentiality Policies
Lecture 5. Integrity Policies
Lecture 6. Hybrid Policies
Lecture 7. Basic Cryptography
Lecture 8. Authentication
Lecture 9. Vulnerability Analysis
Lecture 10. Auditing
Lecture 11. Intrusion Detection
Lecture 12. Network Security, Introduction to Network; Network Protocol

Lab Manual and Exercises

Randy Weaver, Guide to Network Defense and Countermeasures, Thomson course technology, ISBN: 1-4188-3679-6


More IA Study Materials: 

    IA Journals

    IA Academic Links

    Historical Documents