Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.
Upon completion of this course, a student will be able to:
- Compare security technologies including encryption, storage, and transmission methods
- Evaluate social and political arguments relating to information security and privacy
- Engage in healthy and constructive debates that include both technical and political issues around security