Security risks, threats, and vulnerabilities from technical perspectives; confidentiality, integrity, and hybrid policies; cryptography, access control, assurance, accountability, and engineering of secure systems.
Key principles of conventional computer security
Principles and practices of developing secure software systems
Articulate the principles of computer and information security,
Describe similarities and differences among various symmetric and public key
Explain discretionary owner-based, mandatory lattice-based, and role-based access
Describe main types of security policies,
Articulate the principles of security design,
Explain methods of security assurance,
Articulate the defense methods against malicious logic.