Back to courses index

SECB408: Secure Mobile Code

Description:Manifestations of mobile-code based models and mobile agents; Vulnerabilities; Security threats and problems; Protection techniques: protecting the host, protecting the mobile code, language-based protection; Specification, design and development of secure systems involving mobility. (Prerequisite: ITBP301)
Credit Hours.:3
Text Book: Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks, CRC Press, 2005, by Richard R. Brooks, ISBN 0-8493-2272-3.
Coordinator: Mamoun Awad
Topics Outline:
  1. Overview + Disruptive Technologies
  2. Understanding Networks
  3. Network Security Problems
  4. Current Security Solutions
  5. Introduction to Mobile Agents
  6. Mobile Agents
  7. Mobile Agents + Mobile Agents Security
  8. Mobile Agents Security Requirements
  9. Protecting Mobile Code and Mobile Code Platforms
  10. Viruses and Worms
  11. Antivirus systems
  12. Maintaining Trust on the Network
  1. Describe principles of distributed systems.
  2. Identify system security objectives and tradeoffs for mobile code, mobile agents and peer-to-peer networks.
  3. Describe mobile code security threats and counter measures.
  4. Evaluate security solutions used across organizations and individuals.
  5. Design security solutions to defend against malicious code threats.
Mapping of Topics Outline to Outcomes
 1 2 3 4 5 6 7 8 9 10 11 12
Pre-requisiteITBP301: Security Principles and Practice
Volume of the Course that Contributes to CIT Students Outcomes(SOs)
Move the mouse over the Students Outcome number to view the Students Outcome text
a b c d e f g h i j k l m n
13% 11% 11% 0% 0% 0%0% 0% 11% 13% 4% 4% 17% 13%
Show Details