Why is it possible to break into networked computer systems? What
weaknesses are used? And what makes one protocol more secure than
This course answers these questions and more.
We begin the course by looking at weaknesses that have plagued networked systems for years.
then continue with countermeasures like firewalls and security
protocols such as SSL, SSH and IPsec and investigate in detail what
makes them secure.
The course also gives a survey of cryptographic
tools and explains how they can be utilized in protocols and
applications, for example how to provide secure user authentication over
a public network. Knowledge about possible threats and countermeasures
is important not only for the network security specialist but also for
application programmers and everyone else who wants to understand what
level of security a system and an application can offer. By knowing the
problems, future systems can be designed to be much more secure and
reliable than today.