Updated: Wednesday, 26-Oct-2005 07:46:09 EDT
On this page I try to post some relevant and hopefully useful information for the course.
There is a mailing list for this course where every instructor
and all the students taking the course must be subscribed.
To subscribe to the mailing list or to change your subscription:
https://mail.encs.concordia.ca:444/mailman/listinfo/soen321-f04.
If you need assistance in subscribing to a mailing list, please visit
http://www.cs.concordia.ca/help/faq/mailinglist.html
and/or ask assistance of a tutor/lab instructor.
To visit mailing list archives:
https://mail.encs.concordia.ca:444/mailman/private/soen321-f04
Old archives: soen321ml.mbox.txt.gz
Please report any typos and bugs to mokhov@cs.concordia.ca
Title | Topics | Format | Examples | Notes |
---|---|---|---|---|
Introduction | SOEN; Review: Trust Model, CIAN Key Terms; Review: 10 Pages : Cybersecurity Today and Tomorrow: Pay Now Or Pay Later | TXT | ||
Safer E-mail practices and an Intro to Crypto | Safe Email Practices for Yourself and Others; Hashing, conventional crypto, symmetric crypto. | TXT | Examples: Lame DoS Javascript; Embedded virus; Embedded pixel "images" from remote scripts. Turning off HTML graphics distplay and outgoing message format in Yahoo! and Hotmail (HTML). | |
UNIX Security, Part I |
Introduction to UNIX security. Background of UNIX file system, VFS, NFS.
File Permissions; suid and sgid programs.
|
PPT | PDF | ||
UNIX Security, Part II | Threats: Tojans, UNIX path, Login, Worms, Viruses | PPT | PDF | ||
Midterm Overview | Topics overview for the midterm. | PPT | PDF | ||
Intro to Internet-services from Security Standpoint | Connectivity; Security Domains; Firewalls | PPT | PDF | ||
Intro to Internet-services from Security Standpoint II | Secure Communication; ISO Stack and Layers; Packet Encapsulation; | PPT | PDF | ||
Intro to DNS | DNS and Security; DNS Tools in UNIX; Threats | PPT | PDF | ||
Flaws In Cryptographic Protocols | Freshness Flaws; Oracle Flaws (single and multi-); Type Flaws; Implementation-Dependent Flaws; Elimentary Flaws; Others | PPT | PDF |
Title | Topics | Format | Examples | Notes |
---|---|---|---|---|
Risk Management | Risk Management | TXT | HTML | ||
Cybersecurity | Cybersecurity | TXT | HTML | ||
Building Secure Software | Building Secure Software | TXT | HTML | Dr. Probst | |
Security Overview | Overview | TXT | HTML | Dr. Probst | |
CIA, Pass 2 | CIA | TXT | HTML | Dr. Probst | |
Secure Operating Systems | UNIX Considered Harmful | TXT | HTML | Dr. Probst | |
SUID, Sandboxing, Firewalls | UNIX cont'd | TXT | HTML | Dr. Probst | |
Review of Cryptography | Crypto | TXT | HTML | Dr. Probst | |
Simple Cryptographic Examples | Crypto 2 | TXT | HTML | Dr. Probst | |
Firewalls | Firewalls | TXT | HTML | Dr. Probst | |
Design Principles for Security-Conscious Systems | Design issues. | TXT | HTML | Dr. Probst | |
Principles of "Network security" | Network | TXT | HTML | Dr. Probst | |
Supplement on Domain Name System (DNS) Security | DNS | TXT | HTML | Dr. Probst | |
Intrusion Detection Systems | Intrusion Detection Systems | PPT | PDF | TXT | HTML | PPT (and PDF) slides are primarily based on the .txt version of Dr. Probst's notes. | |
Denial of Service | DoS and DDoS | PPT | PDF | ||
SSL | SSL | PPT | PDF | ||
Flaws in Cryptographic Protocols | Flaws. | PPT | PDF | Same as in tutorials. | |
In restrospect... | Review of all questions. | PPT | PDF | Based on the recent and old archives. | |
Review for Final, A2 | A2 solution and final exam issues. | PPT | PDF |
All assignments are due till midnight on a specified date. Don't forget the Submission Guidelines!!!
Home | Tutorials | Contacts | Site Map Assignment Submission Guidelines | Grades Maintained by Serguei A. Mokhov, mokhov@cs.concordia.ca Last modified: Wednesday, 26-Oct-2005 07:46:09 EDT |