Fisher, Doug (Vanderbilt University.) | Isbell, Charles (Georgia Institute of Technology) | Littman, Michael L. (Brown University) | Wollowski, Michael (Rose-Hulman Institute of Technology) | Neller, Todd W. (Gettysburg College) | Boerkoel, Jim (Harvey Mudd College)
The high level of dependency on the internet and technology today has resulted in new revenue streams and business models for organizations, but with this arises new gaps and opportunities for hackers to exploit. Cybercriminals have become increasingly complex and are attempting to steal valuable data like financial data, health records, personal identifiable information (PII) and intellectual property, and are resorting to highly profitable strategies like disrupting the overall operations of a business via DDoS attacks, or monetizing data access via the utilization of advanced ransomware techniques. So, will blockchain technology be a cybersecurity help?
About this course: Mathematical thinking is crucial in all areas of computer science: algorithms, bioinformatics, computer graphics, data science, machine learning, etc. In this course, we will learn the most important tools used in discrete mathematics: induction, recursion, logic, invariants, examples, optimality. We will use these tools to answer typical programming questions like: How can we be certain a solution exists? Am I sure my program computes the optimal answer? Do each of these objects meet the given requirements?