Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A university course in computer security

A university course in computer security This article presents an overview of a graduate-level course in computer security that I created and presented at The American University in Washington D.C. It should be of interest to SIGSAC Review readers who want an overview of the subject or who are teaching similar courses. There are three key elements:1. Course syllabus. This includes a course outline. Emphasis is placed on balanced coverage of all major relevant issues rather than specialized coverage of a few.2. List of research assignments. Twenty two projects are listed. These are areas where computer security research is needed. Work in any area should provide good material for a paper.3. Examinations. Seventy five questions are listed, along with their answers. These can serve as an introduction and reference for computer security neophytes. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

A university course in computer security

ACM SIGSAC Review , Volume 1 (2) – Apr 1, 1982

Loading next page...
 
/lp/association-for-computing-machinery/a-university-course-in-computer-security-fpgK6V0LdA

References (7)

Publisher
Association for Computing Machinery
Copyright
Copyright © 1982 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/1058230.1058232
Publisher site
See Article on Publisher Site

Abstract

This article presents an overview of a graduate-level course in computer security that I created and presented at The American University in Washington D.C. It should be of interest to SIGSAC Review readers who want an overview of the subject or who are teaching similar courses. There are three key elements:1. Course syllabus. This includes a course outline. Emphasis is placed on balanced coverage of all major relevant issues rather than specialized coverage of a few.2. List of research assignments. Twenty two projects are listed. These are areas where computer security research is needed. Work in any area should provide good material for a paper.3. Examinations. Seventy five questions are listed, along with their answers. These can serve as an introduction and reference for computer security neophytes.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Apr 1, 1982

There are no references for this article.