After completion of the course, a student should be able to:
Operating system protection mechanisms. Intrusion detection systems. Formal models of security. Cryptography. Steganography. Network and distributed system security. Denial of service (and other) attack strategies, worms, viruses. Transfer of funds/value across networks. Electronic voting. Secure applications. Homeland cyber security policy, and government regulation of information technology.