Introduction to Information Security

    Class is inactive.

    This class has been expanded and is now taught in the Master program.

    The goal of this class is to expose students to the fundamental concepts of computer and communications security. The growing importance of networks and distributed systems, and their use to support safety-critical applications, has made computer and communications security a central issue for systems today. Additionally, the rise of social networks and location-based services has increased the amount of our personal data held by third parties significantly. It is therefore imperative that students know the technical foundations of computer and communications security, as well as the basic goals and mechanisms of privacy-aware data processing.


    This course provides an overview of the available technologies for achieving security and privacy in an electronic world. Topics discussed include encryption; authentication; security protocols; computer, network, and web security; anonymity; and privacy enhancing technologies.

    Teaching Mode

    Two lectures per week with weekly homework and reading assignments, interspersed with individual lab sessions that discuss homework and provide hands-on experience with developing security solutions.


    • William Stalling: Cryptography and Network Security – Principles and Practices, 57th Ed., Pearson Intl., 2011.

    Additional handouts will be provided as needed, e.g., from:

    • Charlie Kaufman, Radia Perlman, Mike Speciner: Network Security: Private Communication in a Public World, 2nd Ed., Prentice Hall, 2002.
    • Ross Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Ed., Wiley, 2008.


    ClassSemesterInstructorTeaching Assistant(s)
    Introduction to Information Security 2014 Spring
    Introduction to Information Security 2013 Spring
    Introduction to Information Security 2012 Spring
    Mauro Baluda ▫ Ivan ElhartMarcello Paolo Scipioni
    Introduction to Information Security 2011 Spring
    Introduction to Information Security 2010 Spring