Description |
This course surveys the technology underlying secure transactions and safe interactions in a public Internet and wireless world. Topics include cyber security needs such as confidentiality, integrity, availability, access control, authorization, authentication, non-repudiation, trust, privacy and anonymity. Case studies are selected from e-commerce, denial of service attacks, viruses and worms, spam, e-voting, digital rights management, and cyber-terrorism. Related policy, social and economic issues are also discussed. |