Information System Intrusions will discuss threats to security from a network, security strategies and policies, firewall architecture as well as the appropriate intrusion detection systems. This course will also explore pattern matching and artificial intelligence versus computer immunology, read and analyze log files and audits and IP-spoofing and sequence guessing.
- Understand the grounding of principles in earlier security courses.
- Apply security principles to currently popular technologies such as firewalls and intrusion detection systems.
- Construct and adapt firewalls and intrusion detectors and analyze their architectures.