{"id":654,"date":"2015-12-30T09:12:55","date_gmt":"2015-12-30T11:12:55","guid":{"rendered":"http:\/\/www.inf.ufrgs.br\/profcomp_wp\/?page_id=654"},"modified":"2021-07-07T14:44:48","modified_gmt":"2021-07-07T17:44:48","slug":"cmp230","status":"publish","type":"page","link":"https:\/\/www.inf.ufrgs.br\/profcomp\/lista-de-disciplinas\/cmp230\/","title":{"rendered":"CMP230"},"content":{"rendered":"<h3><strong>Computer Systems Security<\/strong><\/h3>\n<p><b>Professor<\/b>: Weverton Luis da Costa Cordeiro<br \/>\n<b>Prerequisites<\/b>: &#8211;<br \/>\n<b>Hours<\/b>: 60 hs<br \/>\n<b>Credits<\/b>: 4<br \/>\n<b>Semesters<\/b>: First semester<br \/>\n<b>Undergraduate Enrollment<\/b>: The enrollment must be made as Special Student<br \/>\n<b>Page Link<\/b>: <a href=\"http:\/\/moodle.inf.ufrgs.br\/course\/view.php?id=459\" target=\"_blank\">http:\/\/moodle.inf.ufrgs.br\/course\/view.php?id=459<\/a><\/p>\n<p><strong>SUMMARY<\/strong><\/p>\n<p align=\"justify\">Overview. Security policies. Design and implementation. Network and computer systems security. Malicious software. Vulnerability analysis. Auditing. Intrusion detection.<\/p>\n<p><strong>OBJECTIVES<\/strong><\/p>\n<p align=\"justify\">At the end of the course students should be able to understand and analyze the fundamental properties of a computer system with respect to its security, based on a clear understanding of the key concepts and the state-of-the-art in the field.<\/p>\n<p><strong>PROGRAM<\/strong><\/p>\n<p align=\"justify\">\u2022 Overview of computer security: basic components, threats, policies and mechanisms, assumptions and trust, guarantees, operational and human issues, control access matrix. Policies: security policies in general, confidentiality policies and integrity policies.<br \/>\n\u2022 Project and implementation: design principles, identity representation, control access mechanisms, information flows, and the confinement problem.<br \/>\n\u2022 Network security: development of policies, network layout, availability, flooding, attack forecast. System security: policies, networks, users, authentication, processes and files.<br \/>\n\u2022 Malicious software: Trojan Horses, viruses, worms, Denial of Service attacks, botnets.<br \/>\n\u2022 Vulnerability analysis: penetration studies, vulnerability classification.<br \/>\n\u2022 Auditing: auditing system organization, mechanisms and examples.<br \/>\n\u2022 Intrusion detection: principles, models, architecture, detection systems organization, intrusion response, and intrusion tolerance.<\/p>\n<p><strong>EVALUATION<\/strong><\/p>\n<p align=\"justify\">Evaluation will be based on two aspects: first, given the assigned topic in systems security, the level of understanding about the subject and how it is delivered during the oral presentation; second, the volume and quality of contributions made by students during the presentation of topics other than his\/her own, related to the state-of-the-art in the topic.<\/p>\n<p><strong>BIBLIOGRAPHY<\/strong><\/p>\n<p align=\"justify\">It is comprised of a textbook and a set of papers from journals and events.<\/p>\n<p>\u2022 Bishop, M. Computer Security: Art and Science. 1a. Ed. Addison-Wesley Professional, 2003. 1136p.<\/p>\n<p>Journals ordered by impact factor:<\/p>\n<p>\u2022 IEEE Transactions on Information Forensics and Security (Impact Factor 2.338)<br \/>\n\u2022 IEEE Transactions on Dependable and Secure Computing (Impact Factor 2.093)<br \/>\n\u2022 Springer International Journal of Information Security (Impact Factor 1.681)<br \/>\n\u2022 Elsevier Computers &amp; Security (Impact Factor 1.488)<br \/>\n\u2022 IEEE Security &amp; Privacy (Impact Factor 1.172)<br \/>\n\u2022 IET Information Security (Impact Factor 0.892)<br \/>\n\u2022 ACM Transactions on Information and Systems Security (Impact Factor 0.600)<br \/>\n\u2022 Wiley Security and Communication Networks (Impact Factor 0.356)<\/p>\n<p>Events ordered by citations\/paper:<\/p>\n<p>\u2022 SECURITY &#8211; Usenix Security Symposium (40.2)<br \/>\n\u2022 S&amp;P &#8211; IEEE Symposium on Security and Privacy (34.8)<br \/>\n\u2022 NDSS &#8211; Network and Distributed System Security Symposium (28.8)<br \/>\n\u2022 IMC &#8211; Internet Measurement Conference (23.6)<br \/>\n\u2022 CCS &#8211; ACM Conference on Computer and Communications Security (20.5)<br \/>\n\u2022 CSF &#8211; IEEE Computer Security Foundations Symposium (18.6)<br \/>\n\u2022 IH &#8211; Information Hiding Workshop (14.8)<br \/>\n\u2022 RAID &#8211; International Symposium on Recent Advances in Intrusion Detection (13.5)<br \/>\n\u2022 NSPW &#8211; New Security Paradigms Workshop (12.6)<br \/>\n\u2022 ESORICS &#8211; European Symposium on Research in Computer Security (9.1)<br \/>\n\u2022 SRDS &#8211; IEEE International Symposium on Reliable Distributed Systems (9.0)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer Systems Security Professor: Weverton Luis da Costa Cordeiro Prerequisites: &#8211; Hours: 60 hs Credits: 4 Semesters: First semester Undergraduate Enrollment: The enrollment must be made as Special Student Page Link: http:\/\/moodle.inf.ufrgs.br\/course\/view.php?id=459 SUMMARY Overview. Security policies. Design and implementation. Network and computer systems security. Malicious software. Vulnerability analysis. Auditing. Intrusion detection. OBJECTIVES At the end [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":462,"menu_order":230,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/pages\/654"}],"collection":[{"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/comments?post=654"}],"version-history":[{"count":5,"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/pages\/654\/revisions"}],"predecessor-version":[{"id":4768,"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/pages\/654\/revisions\/4768"}],"up":[{"embeddable":true,"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/pages\/462"}],"wp:attachment":[{"href":"https:\/\/www.inf.ufrgs.br\/profcomp\/wp-json\/wp\/v2\/media?parent=654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}