Information is an important strategic and operational corporate asset. These days computers and computer networks, are increasingly being used for storing and retrieving information. Some of these information may be of a sensitive nature. Consequently they need to have adequate security measures that can safeguard sensitive information. In this course, we will begin by investigating some of the security measures that can be employed to safeguard information. For the most part we will look into the theory that goes into designing these measures rather than studying security tools and techniques. This is primarily because there are too many of those tools out there and they are changing frequently.
With the growth of social networking a new kind of threat is emerging, namely, user privacy. With privacy we are more concerned about sesitive information not being misused rather than disclosed. We will briefly discuss some of the techniques that can be used for this purpose.
During this course you will be learning about many different security mechanisms some of which can also be used to circumvent or subvert network security measures. Registering for this course implies your agreeing to the Acceptable Use Policy
(AUP) for Computing and Networking Resources at Colorado State
University.
If you have any questions regarding
this course, that is not answered in these pages, please feel free to let
me know.