Computer security and data protection

Introduction to Computer and Information Security: Definitions, Threats, Vulnerabilities, Risks. Logical Access Control: User AUthentication (Passwords, Challenge-Response, One-time Passwords). Access Control Policies, Authorization Models (MAC, DAC, RBAC), Operating System Security. Computer Malware: Viruses, Trojans, Worms, Bots and Botnets, Rootkits, Propagation Techniques. Internet and Web Security, TCP/IP Security, Cryptographic Techniques and Systems for Secure Communications, authenticated key establishments. Network Firewalls.
Code Hours Type eClass Semester
ΗΥ210 4 Compulsory e-Class 4

bibliography: -“Gollmann, D. (2011). Computer Security, 3rd Edition. Wiley, New York.” -“Anderson, R. (2008). Security engineering – A guide to building dependable distributed systems. John Wiley & Sons, New York.”