Course provides an overview of theory, tools and practice of cyber security and information assurance through prevention, detection and modeling of cyber attacks and recovery from such attacks. Techniques for security modeling, attack modeling, risk analysis and cost-benefit analysis are described to manage the security of cyber systems. Fundamental principles of cyber security and their applications for protecting software and information assets of individual computers and large networked systems are explored. Anatomy of some sample attacks designed to compromise confidentiality, integrity and availability of cyber systems are discussed.
|•||•||•||1:00 – 3:40 PM||•||•|
Linda Vahala • Ph: 757-683-4968 • email@example.com