[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Crypto continues to go mainstream
>From: [email protected] (Lance J. Hoffman)
>Newsgroups: sci.crypt,alt.security,comp.security.misc,alt.security.pgp
>Subject: Re: University courses on cryptography and security
>Date: 4 Dec 1996 22:17:20 -0500
>Organization: George Washington University
>Message-ID: <[email protected]>
>References: <[email protected]>
>
>The George Washington University
>GRADUATE DEGREE IN COMPUTER SCIENCE
>Specialization in Computer Security
>
> The George Washington University Department of Electrical
>Engineering and Computer Science
>offers a traditional graduate program with a few twists. One of the
>twists is that we now have four
>graduate courses related to computer security, and an area of
>specialization (within computer science) in
>it. In addition, the opportunities to pursue dissertation work and
>special projects are "real world" since
>many government administrative agencies, laboratories, and Congress
>are usually just a metro ride away.
>=46or those who wish to combine technology and public policy, excellent
>contacts are maintained with the
>law and medical schools and with key congressional and administration
>offices.
>
>DESCRIPTIONS OF COMPUTER SECURITY RELATED COURSES
>
>CS 229. Computer Security Systems I. Techniques for security in
>computer systems. Authentication,
>logging, authorization, encryption. International criteria.ia s.
>Effects of operating systems and
>machine architecture, countermeasures, risk-analysis systems.
>Companion course to EE 250.
>Prerequisite: CSci 144 (Concepts of Programming Languages) or
>equivalent.
>
>CS 329. Computer Security Systems II. Advanced topics in information
>system security. Intrusion detection. Viruses, worms, and trojan
>horses, and other rogue programs. Advanced risk analysis methodologies,
>developing international standards, computer security models. Network
>security. Protection against statistical inference. Prerequisite CS229.
>B
>s
>EE250. Telecommunications Security Systems. Cryptography. Speech
>and data scrambling. Nonlinear
>transformations. Block and stream ciphers. DES algorithm and public
>key cryptography. Key
>management, digital signatures, and authentication. Data
>communication security protocols. Secure voice
>communications. The CLIPPER initiative and escrowed-key schemes.
>Companion course to CS 229.
>Prerequisite EE 204 (Stochastic signals and noise) or equivalent.
>
>CS 230. Information Policy. Issues related to computers and privacy,
>equity, freedom of speech, search
>and seizure, access to personal and governmental information,
>professional responsibilities, ethics,
>criminality, and law enforcement. This course examines these policy
>issues using the current literature
>and written, electronic, and videotape proceedings of recent major
>conferences and government hearings.
>Prerequiste CS 131 (Programming and Data Structures) or equivalent.
>
> FOR FURTHER INFORMATION
>
>Administrative: Contact the Department of Electrical Engineering and
>Computer Science, (202) 994-6083.
>About courses: Contact Prof. Lance J. Hoffman, (202) 994-4955 or
>[email protected].
>
>
>
>December 4, 1996
>--
>Professor Lance J. Hoffman
>Department of Electrical Engineering and Computer Science
>The George Washington University (202) 994-4955 Fax: (202) 994-0227
>Washington, D. C. 20052 [email protected]
>
>--
>Professor Lance J. Hoffman
>Dept of Elec Eng and Comp Sci, The Geo Washington U, 801 22nd St NW
>Wash DC 20052 (202) 994-5513 Fax: (202) 994-0227 =
>[email protected]
>See also info on the Cyberspace Policy Institute:
>http://www.cpi.seas.gwu.edu/