On successful completion of this course students should be able to: 1.Define the concept of secure computer system. 2.Describe the potential threats and risks of jeopardizing the security of computer systems. 3.Describe the concepts of authentication and authorization as well as protocols used for their implementation. 4.Master contents which include encryption and decryption of data, encryption algorithms and protection procedures. 5. Describe methodology used for protection of e-mail, Web, electronic signatures and electronic certificates. 6.Design and implements necessary protection for the specific computer system.
Name | Lectures | Exercises | Laboratory |
---|---|---|---|
UGLJEŠA UROŠEVIĆ | 2x1 12B+20S+9P |