SlideShare a Scribd company logo
1 of 4
Download to read offline
Cyber security: Technology, Application and Policy| Modules, Topics, and Faculty
MODULE ONE: Introduction
The introductory module aims to give a broad survey of the course and of
cybersecurity challenges and opportunities.
Introduction: Cybersecurity (Howard Shrobe)
 Learning from the past: Multics
 Examples of what can go wrong
 Capability architectures
 Tagged architectures, including Memory safety, Type safety, Information flow, and
“Zero Kernel”
Security Overview (Srini Devedas)
 Why security is a hard goal to achieve
 Broad strategies that one can employ to create secure systems
MODULE TWO: Systems Security
The systems security module surveys the system development side of cybersecurity.
Hardware Architectures for Security (Howard Shrobe)
 How novel hardware architectures can help to enforce the security properties that
Operating Systems and Programming Languages expect, including memory safety,
type safety, information flow, and access control
 How to enforce properties in hardware can be much more systematic and
dramatically more efficient than enforcement by software alone
Operating Systems Security (Frans Kaashoek)
 Taking a global, systems-wide view of security. Viewing security as a "negative goal,"
considering all possible paths to security breaches- permissions, access, trojans,
bugs, and many others
 Discussion of various design approaches to securing systems, including complete
mediation, separation privilege, and minimizing the trusted computer base
Verifying Systems (Adam Chlipala)
 How to formulate requirements on secure behavior of C-like programs as rigorous
logical formulas
 How to argue that programs meet such requirements
Secure Programming Languages (Armando Solar Lezama)
 Languages and low-level security properties
 Languages and high-level security properties
 Type safety
MODULE THREE: Cryptography and Network
This module is on algorithms for secure computation and security challenges in
network and protocol design.
Public Key Cryptography (Ron Rivest)
 A quick overview of basic public-key cryptography, including the RSA and El-Gamal
public-key cryptosystems, relevant number theory, security definitions, and
complexity assumptions
 A brief intro to more advanced notions, such as digital signatures, certificates,
homomorphic encryption, and elliptic curves
Multi-party Computation, Secret Sharing, Distributed Trust (Shafi Goldwasser)
 A cryptographic paradigm shift: from communication of private data to computation
over private data
 How to define secure multiparty computation and its applications
 How to achieve multi-party secure computation through polynomial secret sharing
and computation on shares
 Using the principles of multiparty computation to distribute trust and power
Homomorphic and functional encryption (Vinod Vaikuntanathan)
 Solving the all or nothing paradigm of encryption - how do we keep data secure,
while allowing computations on underlying data: how to “have your cake and eat it
too”
 Discussion on the developments in homomorphic encryption from the ‘80s through
today, and constructing partially and fully homomorphic crypto-systems
 How functional encryption systems can grant third-party access to only the precise
information it needs to perform a task
Network Security and Protocol Design (Dave Clark)
 What the different aspects of network security are and what mechanisms are used to
address them
 Why the current state of network security is so poor
MODULE FOUR: Case Studies
This systems module discusses solutions to security in several domains.
Bitlocker (Nickolai Zeldovich)
 Discussion of the challenges of building a disk encryption system using passwords,
removable devices and trusted hardware methods
 Overview of the Trusted platform method and case study of how BitLocker uses this
method
 How BitLocker actually encrypts data using the ‘poor man’s authentication’ method
Resilient Software (Martin Rinard)
 An explanation of how errors can cause serious security vulnerabilities using
examples of buffer and integer overflow errors
 Overview of methods to automatically find and patch these errors, including
transferring correct code from one application to another, and generating patches to
identify errors and produce the correct output
 Discussion of how automating these difficult and expensive manual tasks can
produce software that is more reliable and secure, with enhanced functionality
Web security (Daniel Jackson)
 What makes web applications especially vulnerable to attack
 How attacks against web applications work: two broad classes
 How to defend against attacks, at the design and implementation levels
Mobile Phone Security (Nickolai Zeldovich)
 Discussion of the unique characteristics of a mobile phone that necessitate different
applications from existing desktop or web applications
 Case study of how computer system security works in mobile phones, using the
Android's application model, and mechanisms used by Android to secure data while
allowing applications to share information
 A look back on Android’s development: What worked? What didn’t work? What
changes have been made to overcome challenges?
MODULE FIVE: Policy
This systems module discusses policy aspects of cybersecurity.
The Landscape of Cyber Policy (Danny Weitzner)
 Inquiring into the role public policy plays in sustaining and securing the Internet
 Reviewing six key policy goals embodied in today’s digital communications
environment, how they arose, and what keeps them on track
 Exploring the way progress requires policymakers to understand the background
against which new rules are made

More Related Content

What's hot

International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And PrivacyManan Gadhiya
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...IJNSA Journal
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...Amélie Gyrard
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)ijujournal
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) ijasuc
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONIJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)MiajackB
 

What's hot (20)

International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Ijwns
IjwnsIjwns
Ijwns
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 

Viewers also liked

Leadership lessons from geese assembly
Leadership lessons from geese assemblyLeadership lessons from geese assembly
Leadership lessons from geese assemblygarysking
 
Cooperative values tutor activities
Cooperative values tutor activitiesCooperative values tutor activities
Cooperative values tutor activitiesgarysking
 
Happy 60th birthday john mazwell
Happy 60th birthday john mazwellHappy 60th birthday john mazwell
Happy 60th birthday john mazwellRonetta Stuckey
 
Perrini Gabriella e Zanframundo Gregorio
Perrini Gabriella e Zanframundo GregorioPerrini Gabriella e Zanframundo Gregorio
Perrini Gabriella e Zanframundo GregorioAntonio Mappa
 
EVALUATION QUESTION TWO
EVALUATION QUESTION TWOEVALUATION QUESTION TWO
EVALUATION QUESTION TWOheidibarberms
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsPrakash Prasad ✔
 
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)Antonio Mappa
 
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tiziana
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tizianaNicola andreace (la storia) caramia domenico , sisto giuseppe & greco tiziana
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tizianaAntonio Mappa
 
Nicola Andreace artista di fama internazionale
Nicola Andreace artista di fama internazionaleNicola Andreace artista di fama internazionale
Nicola Andreace artista di fama internazionaleAntonio Mappa
 
Cirneco Marica nicola andreace un artista e le sue maschere
Cirneco Marica nicola andreace un artista e le sue maschereCirneco Marica nicola andreace un artista e le sue maschere
Cirneco Marica nicola andreace un artista e le sue maschereAntonio Mappa
 
Can you push a straw through a potato?
Can you push a straw through a potato?Can you push a straw through a potato?
Can you push a straw through a potato?garysking
 
Subrata_resume update
Subrata_resume updateSubrata_resume update
Subrata_resume updatesubrata nayak
 
Happy 60th birthday john mazwell
Happy 60th birthday john mazwellHappy 60th birthday john mazwell
Happy 60th birthday john mazwellRonetta Stuckey
 

Viewers also liked (14)

Leadership lessons from geese assembly
Leadership lessons from geese assemblyLeadership lessons from geese assembly
Leadership lessons from geese assembly
 
Cooperative values tutor activities
Cooperative values tutor activitiesCooperative values tutor activities
Cooperative values tutor activities
 
Happy 60th birthday john mazwell
Happy 60th birthday john mazwellHappy 60th birthday john mazwell
Happy 60th birthday john mazwell
 
myrole at ibnk
myrole at ibnkmyrole at ibnk
myrole at ibnk
 
Perrini Gabriella e Zanframundo Gregorio
Perrini Gabriella e Zanframundo GregorioPerrini Gabriella e Zanframundo Gregorio
Perrini Gabriella e Zanframundo Gregorio
 
EVALUATION QUESTION TWO
EVALUATION QUESTION TWOEVALUATION QUESTION TWO
EVALUATION QUESTION TWO
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report Details
 
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)
Nicola andreace (il da vinci di massafra) lamanna angelo & miraglia francesco)
 
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tiziana
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tizianaNicola andreace (la storia) caramia domenico , sisto giuseppe & greco tiziana
Nicola andreace (la storia) caramia domenico , sisto giuseppe & greco tiziana
 
Nicola Andreace artista di fama internazionale
Nicola Andreace artista di fama internazionaleNicola Andreace artista di fama internazionale
Nicola Andreace artista di fama internazionale
 
Cirneco Marica nicola andreace un artista e le sue maschere
Cirneco Marica nicola andreace un artista e le sue maschereCirneco Marica nicola andreace un artista e le sue maschere
Cirneco Marica nicola andreace un artista e le sue maschere
 
Can you push a straw through a potato?
Can you push a straw through a potato?Can you push a straw through a potato?
Can you push a straw through a potato?
 
Subrata_resume update
Subrata_resume updateSubrata_resume update
Subrata_resume update
 
Happy 60th birthday john mazwell
Happy 60th birthday john mazwellHappy 60th birthday john mazwell
Happy 60th birthday john mazwell
 

Similar to MITx_Cyber security_Syllabus

Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfHaris Chughtai
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...CSCJournals
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...IJNSA Journal
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxjeffreye3
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 

Similar to MITx_Cyber security_Syllabus (20)

Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 

More from Prakash Prasad ✔ (20)

Term End Results-MPA-II - June 2016
Term End Results-MPA-II - June 2016Term End Results-MPA-II - June 2016
Term End Results-MPA-II - June 2016
 
Coursera understandingterror 2016
Coursera understandingterror 2016Coursera understandingterror 2016
Coursera understandingterror 2016
 
IIMBx FC201
IIMBx FC201IIMBx FC201
IIMBx FC201
 
MITx 6.00
MITx 6.00MITx 6.00
MITx 6.00
 
IIMBx OM101
IIMBx OM101IIMBx OM101
IIMBx OM101
 
IIMBx AC101
IIMBx AC101IIMBx AC101
IIMBx AC101
 
Coursera CNNQD3CGPQM-DMX
Coursera CNNQD3CGPQM-DMXCoursera CNNQD3CGPQM-DMX
Coursera CNNQD3CGPQM-DMX
 
Coursera KT3KEDR8LS3D_DM
Coursera KT3KEDR8LS3D_DMCoursera KT3KEDR8LS3D_DM
Coursera KT3KEDR8LS3D_DM
 
Certificate-IITBx_I
Certificate-IITBx_ICertificate-IITBx_I
Certificate-IITBx_I
 
Coursera coaching 2015
Coursera coaching 2015Coursera coaching 2015
Coursera coaching 2015
 
Coursera XL8R7FKRPN8B
Coursera XL8R7FKRPN8BCoursera XL8R7FKRPN8B
Coursera XL8R7FKRPN8B
 
IIMBx QM101-Stat-II
IIMBx QM101-Stat-IIIIMBx QM101-Stat-II
IIMBx QM101-Stat-II
 
IIMBx ES101x Certificate _Managerial Effectiveness edX
IIMBx ES101x Certificate _Managerial Effectiveness edXIIMBx ES101x Certificate _Managerial Effectiveness edX
IIMBx ES101x Certificate _Managerial Effectiveness edX
 
Coursera cryptography 2015
Coursera cryptography 2015Coursera cryptography 2015
Coursera cryptography 2015
 
Coursera F5UV9L2NDBWY
Coursera F5UV9L2NDBWYCoursera F5UV9L2NDBWY
Coursera F5UV9L2NDBWY
 
Coursera 4GQ3DJZK3W9E
Coursera 4GQ3DJZK3W9ECoursera 4GQ3DJZK3W9E
Coursera 4GQ3DJZK3W9E
 
Coursera whartonmarketing 2015
Coursera whartonmarketing 2015Coursera whartonmarketing 2015
Coursera whartonmarketing 2015
 
MITx 6.00
MITx 6.00MITx 6.00
MITx 6.00
 
Coursera LJYQQ5HEREGG-Strategic Management-CBS
Coursera LJYQQ5HEREGG-Strategic Management-CBSCoursera LJYQQ5HEREGG-Strategic Management-CBS
Coursera LJYQQ5HEREGG-Strategic Management-CBS
 
Coursera whartonaccounting 2015
Coursera whartonaccounting 2015Coursera whartonaccounting 2015
Coursera whartonaccounting 2015
 

MITx_Cyber security_Syllabus

  • 1. Cyber security: Technology, Application and Policy| Modules, Topics, and Faculty MODULE ONE: Introduction The introductory module aims to give a broad survey of the course and of cybersecurity challenges and opportunities. Introduction: Cybersecurity (Howard Shrobe)  Learning from the past: Multics  Examples of what can go wrong  Capability architectures  Tagged architectures, including Memory safety, Type safety, Information flow, and “Zero Kernel” Security Overview (Srini Devedas)  Why security is a hard goal to achieve  Broad strategies that one can employ to create secure systems MODULE TWO: Systems Security The systems security module surveys the system development side of cybersecurity. Hardware Architectures for Security (Howard Shrobe)  How novel hardware architectures can help to enforce the security properties that Operating Systems and Programming Languages expect, including memory safety, type safety, information flow, and access control  How to enforce properties in hardware can be much more systematic and dramatically more efficient than enforcement by software alone
  • 2. Operating Systems Security (Frans Kaashoek)  Taking a global, systems-wide view of security. Viewing security as a "negative goal," considering all possible paths to security breaches- permissions, access, trojans, bugs, and many others  Discussion of various design approaches to securing systems, including complete mediation, separation privilege, and minimizing the trusted computer base Verifying Systems (Adam Chlipala)  How to formulate requirements on secure behavior of C-like programs as rigorous logical formulas  How to argue that programs meet such requirements Secure Programming Languages (Armando Solar Lezama)  Languages and low-level security properties  Languages and high-level security properties  Type safety MODULE THREE: Cryptography and Network This module is on algorithms for secure computation and security challenges in network and protocol design. Public Key Cryptography (Ron Rivest)  A quick overview of basic public-key cryptography, including the RSA and El-Gamal public-key cryptosystems, relevant number theory, security definitions, and complexity assumptions  A brief intro to more advanced notions, such as digital signatures, certificates, homomorphic encryption, and elliptic curves Multi-party Computation, Secret Sharing, Distributed Trust (Shafi Goldwasser)  A cryptographic paradigm shift: from communication of private data to computation over private data
  • 3.  How to define secure multiparty computation and its applications  How to achieve multi-party secure computation through polynomial secret sharing and computation on shares  Using the principles of multiparty computation to distribute trust and power Homomorphic and functional encryption (Vinod Vaikuntanathan)  Solving the all or nothing paradigm of encryption - how do we keep data secure, while allowing computations on underlying data: how to “have your cake and eat it too”  Discussion on the developments in homomorphic encryption from the ‘80s through today, and constructing partially and fully homomorphic crypto-systems  How functional encryption systems can grant third-party access to only the precise information it needs to perform a task Network Security and Protocol Design (Dave Clark)  What the different aspects of network security are and what mechanisms are used to address them  Why the current state of network security is so poor MODULE FOUR: Case Studies This systems module discusses solutions to security in several domains. Bitlocker (Nickolai Zeldovich)  Discussion of the challenges of building a disk encryption system using passwords, removable devices and trusted hardware methods  Overview of the Trusted platform method and case study of how BitLocker uses this method  How BitLocker actually encrypts data using the ‘poor man’s authentication’ method Resilient Software (Martin Rinard)  An explanation of how errors can cause serious security vulnerabilities using examples of buffer and integer overflow errors  Overview of methods to automatically find and patch these errors, including transferring correct code from one application to another, and generating patches to identify errors and produce the correct output
  • 4.  Discussion of how automating these difficult and expensive manual tasks can produce software that is more reliable and secure, with enhanced functionality Web security (Daniel Jackson)  What makes web applications especially vulnerable to attack  How attacks against web applications work: two broad classes  How to defend against attacks, at the design and implementation levels Mobile Phone Security (Nickolai Zeldovich)  Discussion of the unique characteristics of a mobile phone that necessitate different applications from existing desktop or web applications  Case study of how computer system security works in mobile phones, using the Android's application model, and mechanisms used by Android to secure data while allowing applications to share information  A look back on Android’s development: What worked? What didn’t work? What changes have been made to overcome challenges? MODULE FIVE: Policy This systems module discusses policy aspects of cybersecurity. The Landscape of Cyber Policy (Danny Weitzner)  Inquiring into the role public policy plays in sustaining and securing the Internet  Reviewing six key policy goals embodied in today’s digital communications environment, how they arose, and what keeps them on track  Exploring the way progress requires policymakers to understand the background against which new rules are made