Applied Cryptography and Information Systems Security

This class examines applied cryptographic services, mechanisms, and applications as well as their related threats within an enterprise context. Specific cryptographic services include confidentiality, integrity, authentication, and nonrepudiation. Specific mechanisms include encryption, message authentication codes, digital signatures and digital certificates Specific applications include: Public Key Infrastructure (PKI), secure protocols, and virtual private networks (VPNs). Counter-measures including network monitoring and intrusion detection are also examined. Intrusion detection systems can detect and limit potential system compromises. Since these systems provide a historical record of network and system events, they can also provide assurance that an enterprise’s infrastructure has not been compromised. Laboratory exercises provide an opportunity to apply class concepts. Laboratory activities include: encryption/decryption, file integrity testing, secure key exchange, Public Key Infrastructure, system, network, and vulnerability scanning. Other lab activities relate to secure protocols and Virtual Private Networks (VPNs).

For more information, please choose one of the links at the left.
Note that each of these links will open a PDF file.