At the end of the course students
Concrete examples of attacks and countermeasures are often specific to a certain setting (a programming language and/or type of application); the aim provide enough insight to be able to assess problems and proposed solutions in other situations.
- can explain the common ways in which software security fails;
- are able to identify security objectives of applications and identify likely places where they might fail;
- can explain methods and technologies that can help in the development of secure software;
- can apply some of these techniques in practice.
Software is THE most important cause of computer security problems. This course is about the challenges in developing secure software and the technologies that can be used to improve software security, at the various stages in the software development life-cycle, and at various "levels", eg. specific to an individual application or at the level of the programming language.|
|Programming skills, in particular basic knowledge of C(++) and Java.|
|The final grade is based on a written exam and marks for the project assignments.|
|This is the 6 EC course. For students taking the TRU/e Security master there is a 5EC version of this course, NWI-IMC051.|