Laureate Online Education Information Security Engineering © All rights reserved 2000-2009. The Information Security Engineering module, in all its parts: syllabus, guidelines, lectures, discussion questions, technical notes, images, projects and any additional material is copyrighted by Laureate Online Education. Information Security Engineering Seminar for Week 1 Introduction, Security Models and Security Protocols WELCOME to this module on Information Security Engineering. Over the next few weeks we will be exploring, thinking about and discussing ideas on the principles and practice of building secure distributed systems. In particular, we will be covering topics including: - basic cryptology such as encryption and authentication - security models and security protocols - password protection, authentication and access control - secure networking and internetworking - digital content protection - hardware security - intrusion detection - security projects management and security evaluation - practical considerations We will become familiar with state-of-the-art techniques in Information Security Engineering. In our first seminar, we will learn about security engineering problems through examples. We will look at several application areas and identify particular security-critical problems. We will then move on to the unifying theme of security engineering: security protocols, basic security models and related standard frameworks. What does security mean in general? Word “security” is overloaded and different people and specialists may mean different things when using this word in different subject specific context. In our course we will mostly deal with the following areas: computer systems security, network and telecommunication systems security, computer and networking applications security, and Information security in general. Security in general means a set of principles, models, rules, and mechanisms to ensure correct and reliable system or application operation and to achieve the following generic security properties (of the secure system operation, subject or entity): • Confidentiality • Authenticity Page 1 of 17 • Integrity • Access control • Availability Such widely discussed and used security characteristic as privacy is actually a combination of the few basic security properties and a privacy policy that may be different in different environment and for different applications. These security properties are applicable for both physical security, computer security, and human security. It may be an interesting topic for discussion in the classroom how these generic security properties are applied in different areas and to different entities. We will learn how to achieve these security properties or characteristics in system operations and how to design secure systems by applying security principles, models, mechanisms, and s ...