16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Body of Knowledge coverage<br />

KA Knowledge Unit Topics Covered Hours<br />

AR Machine-level<br />

Review of representation of programs as data, and numeric, 1<br />

representation of data and non-numeric data and arrays. These and the rest of topics<br />

within this KU are covered within our Computer<br />

Architecture course.<br />

HCI Human Factors and Security All [Elective]. 3<br />

IAS Foundational Concepts in All [1 Core-Tier1 hour]. 2<br />

Security<br />

IAS Principles of Secure Design All Core-Tier1 topics plus prevention, detection, and 3<br />

deterrence, and usable security from Core-Tier2 topics [1<br />

Core-Tier1 hour, 1 Core-Tier2 hour].<br />

IAS Defensive Programming All topics in Core-Tier1 except security implications of 5<br />

parallel programming plus the security updates topic in Core-<br />

Tier2. Also, OS and compiler support from the Elective<br />

topics. [1 Core-Tier1 hour, 1 Core-Tier2 hour].<br />

IAS Threats and Attacks All topics in Core-Tier2 [1 Core-Tier2 hour]. 2<br />

IAS Network Security All topics in Core-Tier2 [1 Core-Tier2 hour]. 6<br />

IAS Cryptography All topics in Core-Tier2 [1 Core-Tier2 hour]. Plus<br />

4<br />

Cryptographic primitives, and symmetric and public key<br />

cryptography from the Elective topics.<br />

IAS Web Security Most topics and all learning outcomes [Elective]. 4<br />

IAS Security Policy and All topics [Elective]. 2<br />

Governance<br />

NC Introduction Review of physical pieces of a network and roles of the 0.5<br />

different layers. These and the rest of the topics in this KU<br />

are covered in our Computer Networks course.<br />

NC Networked Applications Review of naming and addressing schemes and systems. 1<br />

These and the rest of the topics in this KU are covered in our<br />

Computer Networks course.<br />

NC Local Area Networks Review of Ethernet and switching. These and the rest of the 0.5<br />

topics in this KU are covered in our Computer Networks<br />

course.<br />

OS Security and Protection All topics in Core-Tier2, except security mechanisms and<br />

protection, which are covered in our Operating Systems<br />

course.<br />

1<br />

PL<br />

SP<br />

Language Translation and<br />

Execution<br />

Security Policies, Laws, and<br />

Computer Crimes<br />

Additional topics<br />

Computer systems hardening.<br />

Other comments<br />

None.<br />

Review of run-time stack in the context of buffer overflows. 1<br />

Some of the other topics in this KU such as memory<br />

management are covered within our OO Design and<br />

Implementation course which uses C++.<br />

All topics except crime prevention strategies [Elective]. 2<br />

- 297 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!