• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
• Teaching staffs • Textbook and Grading • Course Schedule • Motivation • Suggested reading – Preface xvii~xx • Bit and Byte • Context is very important • Understand machine representations of numbers • Information storage • Bit level manipulation • Suggested reading
Unit 2 More about Computer Text 1 Guess What It is Let's begin this unit with a riddle. Try to guess what it is? It is like a tv. but it is not It is a calculator but it is more than a calculator It is not so mysterious, but it is powerful and intelligent When you want to send or receive e-mail