Lec 1
Lec 1
Introduction to Security
Software: Security principles, concept of computer security, security services and policies Security risks:
Database security, operating systems security, secure coding Countermeasures: methodologies and tools
for identifying and eliminating security vulnerabilities, techniques to prove the absence of vulnerabilities,
and ways to avoid security holes in new software. Secure software design: essential guidelines for
building secure software, information security standards
Texts
• Cryptography and Network Security Principles
and Practice, William Stallings, Prentice Hall,
Fifth edition
• Cryptography and Network Security, Behrouz
A. Forouzan and Debdeep Mukhopadhyay,
McGraw Hill, Second Edition
References