As members of the university, you are required to adhere to these policies.
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications.
.pass_color_to_child_links a.u-inline.u-margin-left--xs.u-margin-right--sm.u-padding-left--xs.u-padding-right--xs.u-relative.u-absolute.u-absolute--center.u-width--100.u-flex-inline.u-flex-align-self--center.u-flex-justify--between.u-serif-font-main--regular.js-wf-loaded .u-serif-font-main--regular.amp-page .u-serif-font-main--regular.u-border-radius--ellipse.u-hover-bg--black-transparent.web_page .u-hover-bg--black-transparent:hover.
Content Header .feed_item_answer_user.js-wf-loaded .
To defend a system you need to be able to think like an attacker, and that includes understanding techniques that can be used to compromise security.
However, using those techniques in the real world may violate the law and the university's computing practices, or may be unethical.
Understand what the law prohibits — you don't want to end up like this guy.
The EFF provides helpful advice on vulnerability reporting and other legal matters. Please review CAEN's policy document on rights and responsibilities for guidelines concerning use of technology resources at U-M, as well as the Engineering Honor Code.
This course covers foundational work and current topics in computer systems security.
We will read research papers and discuss attacks and defenses against operating systems, client-side software, web applications, and IP networks.