Spring 2013 textbook list
The Spring 2013 ECE textbook list is available online for students.
Current Prerequisites & Course Offering
For current prerequisites for a particular course, and to view course offerings for a particular semester, see the Virginia Tech Course Timetables.
ECE 5585 Information Technology Security and Trust (3C)
Fundamental Internet and computer security principles and applications; legal and privacy issues, risk analysis, attack tecniques, intrusion detection concepts, basic computer forensics, and system and application security hardening techniques.
This class teaches Masters of Information Technology (MIT) students how to properly test computer systems, networks or applications for compliance with the laws, regulations, and policies enacted local, state, and federal governments. The requisite knowledge of these fundamental security concepts provides the student with the necessary background to enhance their academic and practical knowledge. The sequence also provdes the advanced trustworthy network concept required to be able to synthesize elements from networking, security, privacy and trust concepts, protocols and technology to affect defense-in-depth in modern computing and network systems, and to engineer and evaluate relevant security and trust solutions.
Typically offered: Fall. Program Area: Computers.
Prerequisites: Graduate Standing.
Department Syllabus Information:Major Measurable Learning Objectives:
- Idendify the legal, privacy, and ethical aspects of computer security.
- Analyze techniques used by hackers to penetrate systems and networks.
- Analyze systems and software applications for security vulnerabilities and recommend corrective measures.
- Identify common network and system attacks and devise plans to eliminate problems.
- Explain core security issues related to wired/wireless networks.
- Evaluate basic encryption techniques and specify appropriate security practices for specific situations.
|1. Legal and ethical aspects of computer security||15%|
|2. Risk analysis||10%|
|3. User authentication||10%|
|4. Introduction to network security standards||10%|
|5. Cryptography and its role in computer security||10%|
|6. Software application security||15%|
|7. Penetration study methodologies||15%|
|8. Instrusion detection techniques||15%|