• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats