About this Course

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

탄력적인 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

완료하는 데 약 11시간 필요

권장: 7 hours/week...

영어

자막: 영어

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

탄력적인 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

완료하는 데 약 11시간 필요

권장: 7 hours/week...

영어

자막: 영어

강의 계획 - 이 강좌에서 배울 내용

1
완료하는 데 4시간 필요

Enhance Security with Geolocation

In this module, we discuss the geoencryption techniques, the issues in the design and analysis of a Secure Enhanced Geolocking system for protected encrypted info with geolocking. We learn the web based implementation of an Secure Enhancing Geolocking system using Javascript with Google Map API and CryptoJS API. ...
3 videos (Total 20 min), 2 readings, 5 quizzes
3개의 동영상
Lesson 4.2 Secure Enhanced Geolocking8m
Ensure Data Delivery to Right Location2m
2개의 읽기 자료
Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.
Read SEG master project report by Ashish Korpe
4개 연습문제
L1.1 Practice Quiz10m
L1.2. Practice Quiz15m
L1.3. Practice Quiz9m
Quiz: M1 quiz20m
2
완료하는 데 3시간 필요

Enhance Security with Network and Context Information

In this module, we learn the techniques for using WiFi or BLE signals to estimate the geolocation of a user. We also show the technique where the value added Software Defined Network services can be used to ensure the data are delivered through a designated path to the right location....
3 videos (Total 14 min), 3 readings, 4 quizzes
3개의 동영상
Location Verification Using Bluetooth Low Energy Devices5m
Right Path Right Place Data Delivery3m
3개의 읽기 자료
Read the following papers related to Right Place Verification30m
Read paper on using RSSI measurement of BLE devices for localization30m
Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis40m
4개 연습문제
L2.1 Practice Quiz9m
L2.2. Practice Quiz12m
L2.3 Practice Quiz9m
M2 quiz30m
3
완료하는 데 3시간 필요

Authentication and Role Based Access Control

In this module, we discuss the definition of the authentication, the types of authentication credentials, and the authentication process and related requirements. we learn the Role Based Access Control, short for RBAC, which is an security approach to restricting system access to authorized users and to help specify organization's security policies reflecting its organizational structure. We use Docker Universal Control Plan and AWS IAM access control as examples for illustrating how RBAC simplifies the access control specification and management. ...
4 videos (Total 24 min), 4 readings, 4 quizzes
4개의 동영상
Digital Certificate Creation7m
Role Based Access Control (RBAC)4m
RBAC Examples: Docker UCP and AWS IAM5m
4개의 읽기 자료
Watch OAuth presentation.
Read how digital certificates are created for secure web access15m
Reading assignments for RBAC.20m
Read Docker and AWS RBAC support example.10m
4개 연습문제
L3.1 Practice Quiz8m
L3.2 Practice Quiz8m
L3.3 Practice Quiz8m
M3 Quiz30m
4
완료하는 데 3시간 필요

Authorization and Attribute Based Access Control

In this module, we discuss PMI Privilege Management Infrastructure for managing the authorization of privileges within a system. We use attribute certificates as an instrument to associate access rights of the resources/services in the system to the identities or roles of the intended users of the system. We compare the differences between the PKI, the public key infrastructure which is focused on identity management, with the PMI which is focused on the management of the privileges authorized for users. We discuss their difference usages for the access control of the system. We then present the XACML, which is an eXtensible Access Control Markup Language (XACML) for specifying policies. It is an attribute-based access control system (ABAC), where attributes associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way. An implementation of ABAC system using Sun’s XACML 2.0 Java reference implementation called ENFORCE is then presented as an example....
4 videos (Total 23 min), 3 readings, 4 quizzes
4개의 동영상
eXtensible Access Control Markup Language (XACML)4m
Attribute Based Access Control4m
Enforce Testbed as an ABAC Example6m
3개의 읽기 자료
Read the following paper which utilize attribute certificates for secure information sharing.
Read key sections of OASIS Standard XACML version 3.020m
Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.020m
4개 연습문제
L4.1 Practice Quiz8m
L4.2 Practice Quiz16m
Quiz L4.3 Practice Quiz6m
M4 Quiz30m

강사

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

콜로라도 대학교 정보

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Advanced System Security Design 전문 분야 정보

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

자주 묻는 질문

  • 강좌에 등록하면 바로 모든 비디오, 테스트 및 프로그래밍 과제(해당하는 경우)에 접근할 수 있습니다. 상호 첨삭 과제는 이 세션이 시작된 경우에만 제출하고 검토할 수 있습니다. 강좌를 구매하지 않고 살펴보기만 하면 특정 과제에 접근하지 못할 수 있습니다.

  • 강좌를 등록하면 전문 분야의 모든 강좌에 접근할 수 있고 강좌를 완료하면 수료증을 취득할 수 있습니다. 전자 수료증이 성취도 페이지에 추가되며 해당 페이지에서 수료증을 인쇄하거나 LinkedIn 프로필에 수료증을 추가할 수 있습니다. 강좌 내용만 읽고 살펴보려면 해당 강좌를 무료로 청강할 수 있습니다.

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.