6.857 Network and Computer Security, Fall 2003
Author(s)
Rivest, Ronald
Download6-857-fall-2003/contents/index.htm (35.67Kb)
Alternative title
Network and Computer Security
Metadata
Show full item recordAbstract
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.
Date issued
2003-12Other identifiers
6.857-Fall2003
local: 6.857
local: IMSCP-MD5-7c051b28ff8cec62c18626cb6bda0647
Keywords
network, computer security, security, cryptography, secret-key, public-key, digital signature, authentication, identification, intrusion detection, virus, operating system, software, protection, electronic mail, email, electronic commerce, electronic cash, firewall, computer, digital, signature, electronic, cash, commerce, mail, operating, system, intrustion, detection, distributed, physical, discretionary, mandatory, access, control, biometrics, information, flow, models, covert, channels, integrity, logic, voting, risk, assessment, secure, web, browsers, architecture, engineering, certificates, multi-user computer systems, distributed computer systems, physical security, discretionary access control, mandatory access control, biometrics, information-flow models, covert channels, integrity models, elementary cryptography, authentication logic;electronic cash, viruses, firewalls, electronic voting, risk assessment, secure web browsers, network security, computer security, architecture engineering, secret-key, public-key, digital signatures, authentication schemes, identification schemes, intrusion detection, formal models, secure operating systems, software protection, electronic mail security, World Wide Web, electronic commerce, ecommerce, email security, www, payment protocols, electronic cash, authentication logic