At the end of the course students
- can explain the common ways in which software security fails;
- are able to identify security objectives of applications and identify likely places where they might fail;
- can explain methods and technologies that can help in the development of secure software;
- can apply some of these techniques in practice.
Concrete examples of attacks and countermeasures are often specific to a certain setting (a programming language and/or type of application); the aim provide enough insight to be able to assess problems and proposed solutions in other situations.
|
|
Software is THE most important cause of computer security problems. This course is about the challenges in developing secure software and the technologies that can be used to improve software security, at the various stages in the software development life-cycle, and at various "levels", eg. specific to an individual application or at the level of the programming language.
Instructional Modes
- Lecture
- Presentation
- Self-study
|
|
|
Knowledge of programming and of programming languages, in particular C(++), incl. the use of pointers, and Java (or a similar modern object-oriented language).
|
|
Written exam and mandatory project work (for bonus point)
|
|
This is the 6 EC course. For students taking the TRU/e Security master there is a 5EC version of this course, NWI-IMC051. |
|