M.S. Cybersecurity and Privacy

The Cybersecurity and Privacy program offers comprehensive knowledge of network-based and system-level attacks, and effective countermeasures to ensure that software and cyber infrastructure are designed and implemented with top-notch security practices.

Summary

  • Describe cybersecurity and privacy mechanisms, standards and state-of-the-art capabilities.
  • Describe potential cyber attacks and the actors that might perform them, and apply cyber defense methods to prepare a system to repel attacks.
  • Perform security review of applications, systems and infrastructure.
  • Design and implement system, network and infrastructure-level solutions to ensure the security and privacy of communications and data against specific security threats, while understanding the trade-offs between security, usability and performance.
  • Use standard security terminology to communicate effectively with other cybersecurity professionals.
  • Understand the ethical and legal implications of cyber attacks.

Cryptography and Security

  • Understand the difference between the symmetric key and public key cryptography approaches.
  • Select appropriate symmetric and public key cryptography protocols for a given application.
  • Develop an efficient implementation of a cryptographic protocol based on a Discrete Logarithm Problem, RSA (Factoring) Problem or Elliptic Curve Discrete Logarithm Problem.

Security and Privacy in Computing

  • Understand the various models to evaluate the security of computer systems.
  • Interpret security guarantees and assess the level of security provided by a cryptographic protocol.
  • Understand the various security goals for communication over an insecure network.
  • Identify the appropriate types of cryptographic primitives that should be used to achieve each of these goals.
  • Understand the advantages and limitations of using symmetric key versus public-key cryptography.

Network Protocols Security

  • Identify the appropriate security primitives that should be used to achieve specific security goals for communication over insecure networks.
  • Analyze the security of the main mechanisms used on the internet to secure communication between computer systems at various network layers, including physical, network, transport and application layers.
  • Describe common attacks against wired and wireless network protocols using standard terminology, allowing them to communicate effectively with other security professionals.

Core Faculty

Jonathan Smitherson

Rohloff, Kurt R.

Associate Professor

Rohloff, Kurt R.
Associate Professor, Computer Science
Official
GITC 4409
Jonathan Smitherson

Neamtiu, Iulian

Associate Professor

Neamtiu, Iulian
Associate Professor, computer science
Official
4108 gitc
Jonathan Smitherson

Wu, Chase Qishi

Associate Professor

Wu, Chase Qishi
Associate Professor, Computer Science
Official
GITC 4107
Jonathan Smitherson

Mili, Ali

Professor and Associate Dean for Academic Affairs

Mili, Ali
Professor and Associate Dean for Academic Affairs, Computer Science
Official
4305 GITC, 4207 GITC
Jonathan Smitherson

Borcea, Cristian M.

Professor

Borcea, Cristian M.
Professor, Computer Science
Official
GITC 4201A
Jonathan Smitherson

Oria, Vincent

Professor

Oria, Vincent
Professor, Computer Science
Official
GITC 4317D

Advisement

Jonathan Smitherson

Bell, Michele A.

Academic Advisor

Bell, Michele A.
Academic Advisor, CCS
Official
3400 gitc
Jonathan Smitherson

Olsen, George W.

Academic Advisor

Olsen, George W.
Academic Advisor, College of Computing Sciences
Official
GITC - 3400