CSCI 7000-001: Foundations of Computer and Network Security
Lecture Notes
This page contains lecture notes and other material that is relevat to the course.
Lecture n. 26 (11 December)
: Legal Aspects: a Primer (Part II, expanded notes from Lecture 25)
[
PDF
100 Kb,
PostScript
60 Kb ]
Lecture n. 25 (6 December)
: Legal Aspects: a Primer
[
PDF
92 Kb,
PostScript
48 Kb ]
Lecture n. 24 (4 December)
: Principles of Intrusion Detection
[
PDF
56 Kb,
PostScript
28 Kb ]
Lecture n. 23 (29 November)
: Security in relational database systems (by
Jose Garcia
)
[
PDF
76 Kb,
PostScript gzip'd
44 Kb ]
Lecture n. 22 (27 November)
: Java security mechanisms (by
Jing Deng
)
[
PDF
212 Kb,
PostScript gzip'd
236 Kb ]
Lecture n. 21 (20 November)
: Trusted systems: models and design principles
[
PDF
72 Kb,
PostScript
40 Kb ]
Lecture n. 20 (15 November)
: Protections against malicious code
[
PDF
116 Kb,
PostScript gzip'd
20 Kb ]
Lecture n. 19 (13 November)
: Malicious programs
[
PDF
68 Kb,
PostScript
36 Kb ]
Lecture n. 18 (1 November)
: Firewall and packet filtering
[ see expanded notes for lecture 17 (below) ]
Lecture n. 17 (30 October)
: Firewall and packet filtering (reviewed and expanded for lecture n. 18)
[
PDF
80 Kb,
PostScript gzip'd
30 Kb ]
Lecture n. 16 (25 October)
: Network-level security: IPSec Key and Association Management Framework
[
PDF
56 Kb,
PostScript gzip'd
12 Kb,
RFC2409
]
Lecture n. 15 (23 October)
: Network-level security: IPSec basic architecture, AH, and ESP
[
PDF
136 Kb,
PostScript gzip'd
28 Kb ]
Lecture n. 14 (18 October)
: Network-level security: IPSec basic architecture
[
PDF
76 Kb,
PostScript gzip'd
20 Kb,
RFC2401
]
Lecture n. 13 (16 October)
: Other techniques to secure client/server systems
[
PDF
48 Kb,
PostScript gzip'd
16 Kb ]
Lecture n. 12 (11 October)
: Anatomy of an SSL client/server system
[
PDF
68 Kb,
PostScript
16 Kb,
examples
24 Kb ]
Lecture n. 11 (9 October)
: SSL: communication security for distributed applications
[
PDF
124 Kb,
PostScript gzip'd
24 Kb ]
Lecture n. 10 (2 October)
: pretty good privacy with PGP (part 2)
[
PDF
100 Kb,
PostScript gzip'd
28 Kb ]
Lecture n. 9 (27 September)
: pretty good privacy with PGP
[
PDF
96 Kb,
PostScript
28 Kb ]
Lecture n. 8 (20 September)
: basic protocol design principles
[
PDF
412 Kb,
PostScript gzip'd
96 Kb ]
Lecture n. 7 (18 September)
: public-key authentication, mediated authentication, message authentication, key exchange, certificates
[
PDF
608 Kb,
PostScript gzip'd
196 Kb ]
Lecture n. 6 (13 September)
: public-key cryptography: RSA
[
PDF
124 Kb,
PostScript gzip'd
20 Kb ]
R.L. Rivest, A Shamir, and L. Adleman,
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
, Communications of the ACM, 21(2), pp. 120-126, 1978.
Lecture n. 5 (11 September)
: basic protocols: authentication
[
PDF
636 Kb,
PostScript gzip'd
216 Kb ]
Lecture n. 4 (6 September)
: basics of cryptography and protocols (2)
[
PDF
636 Kb,
PostScript gzip'd
192 Kb ]
Lecture n. 3 (4 September)
: introduction to cryptography
[
PDF
864 Kb,
PostScript gzip'd
252 Kb ]
Lecture n. 2 (30 August)
: terminology and models.
[
PDF
832 Kb,
PostScript gzip'd
272 Kb ]
Links and papers on the Morris worm:
www.worm.net
: sources, patches, legal documents, a couple of analysis docs.
other collection of documents, source, etc. at Purdue
, including Spafford's technical report on the worm.
E. H. Spafford.
The Internet Worm: Crisis and Aftermath
, Communications of the ACM, 32(6), pp. 678-687, 1989.
Lecture n. 1 (28 August)
: introduction to the course.
[
PDF
892 Kb,
PostScript gzip'd
232 Kb ]
this page is maintained by
Antonio Carzaniga
, $Date: 2002/02/01 16:30:16 $