Information Security

As time goes on, more and more information is placed on the Internet at the fingertips of regular people. This information is also available to those with a malicious intent. It seems like every day (http://www.usatoday.com/story/money/2016/02/26/cyber-hack-gained-access-more-than-700000irs-accounts/80992822), a new hack (http://timesofindia.indiatimes.com/tech/tech-news/Over-8000-website-hacking-incidents-in-Jan-Mar-2016Government/articleshow/52110920.cms) or a new exploit (http://money.cnn.com/2016/05/19/technology/linkedin-hack) has been made available or used online, allowing for access to information (http://www.computerweekly.com/news/450298683/LogMeIn-resets-user-passwords-after-scouring-datadumps-from-LinkedIn-Tumblr-and-MySpace-hacks) that should not be. The Graduate Certificate in Information Security covers topics that help to protect this information so we can all be safer online.

[1]  B. Dutertre,et al.  Intrusion tolerant software architectures , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[2]  Rangaswamy Jagannathan,et al.  SYSTEM DESIGN DOCUMENT: NEXT-GENERATION INTRUSION DETECTION EXPERT SYSTEM (NIDES) , 1993 .

[3]  Radek Vingralek,et al.  How to build a trusted database system on untrusted storage , 2000, OSDI.

[4]  Paul Helman,et al.  Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..

[5]  Sushil Jajodia,et al.  Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[6]  Eric Rescorla,et al.  An introduction to OpenSSL programming, part II of II , 2001 .

[7]  Kjeld Høyer Mortensen Automatic Code Generation Method Based on Coloured Petri Net Models Applied on an Access Control System , 2000, ICATPN.

[8]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[9]  BishopMatt,et al.  The threat from the net , 1997 .

[10]  Donald Sannella,et al.  The Definition of Extended ML: A Gentle Introduction , 1997, Theor. Comput. Sci..

[11]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[12]  John P. McDermott,et al.  Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[13]  Ninghui Li,et al.  Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..

[14]  George C. Necula,et al.  Safe kernel extensions without run-time checking , 1996, OSDI '96.

[15]  David Mosberger,et al.  httperf—a tool for measuring web server performance , 1998, PERV.

[16]  Peng Liu Architectures for intrusion tolerant database systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[17]  Frank Pfenning,et al.  System Description: Twelf - A Meta-Logical Framework for Deductive Systems , 1999, CADE.

[18]  Sushil Jajodia,et al.  Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..

[19]  Peng Liu,et al.  ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications , 2001, DBSec.

[20]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..

[21]  B. A. Hartman A Gypsy-Based Kernel , 1984, 1984 IEEE Symposium on Security and Privacy.

[22]  Deep Medhi,et al.  Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[23]  Sushil Jajodia,et al.  Using Checksums to Detect Data Corruption , 2000, EDBT.

[24]  David P. Reed,et al.  Naming and synchronization in a decentralized computer system , 1978 .

[25]  Matthew C. Elder,et al.  Survivability architectures: issues and approaches , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.