SOEN321 - Information-Systems Security - Some Course Materials

Updated: Wednesday, 26-Oct-2005 07:46:09 EDT


Table of Contents

  1. NEW Fall 2005 Midterm Notes

  2. Intro

  3. Lectures

  4. Tutorials

  5. Assignments and Deadlines

  6. Assignment Grades and Submission Status (check from time to time)

  7. IMPORTANT! Assignment Submission Guidelines


Intro

On this page I try to post some relevant and hopefully useful information for the course.

Mailing List

There is a mailing list for this course where every instructor and all the students taking the course must be subscribed.

To subscribe to the mailing list or to change your subscription:
https://mail.encs.concordia.ca:444/mailman/listinfo/soen321-f04.

If you need assistance in subscribing to a mailing list, please visit http://www.cs.concordia.ca/help/faq/mailinglist.html and/or ask assistance of a tutor/lab instructor.

To visit mailing list archives:
https://mail.encs.concordia.ca:444/mailman/private/soen321-f04

Old Archives

Old archives: soen321ml.mbox.txt.gz

Please report any typos and bugs to mokhov@cs.concordia.ca


Tutorial Slides and Examples

Title Topics Format Examples Notes
Introduction SOEN; Review: Trust Model, CIAN Key Terms; Review: 10 Pages : Cybersecurity Today and Tomorrow: Pay Now Or Pay Later TXT    
Safer E-mail practices and an Intro to Crypto Safe Email Practices for Yourself and Others; Hashing, conventional crypto, symmetric crypto. TXT Examples: Lame DoS Javascript; Embedded virus; Embedded pixel "images" from remote scripts. Turning off HTML graphics distplay and outgoing message format in Yahoo! and Hotmail (HTML).  
UNIX Security, Part I Introduction to UNIX security. Background of UNIX file system, VFS, NFS. File Permissions; suid and sgid programs. PPT | PDF    
UNIX Security, Part II Threats: Tojans, UNIX path, Login, Worms, Viruses PPT | PDF    
Midterm Overview Topics overview for the midterm. PPT | PDF    

Intro to Internet-services from Security Standpoint Connectivity; Security Domains; Firewalls PPT | PDF    
Intro to Internet-services from Security Standpoint II Secure Communication; ISO Stack and Layers; Packet Encapsulation; PPT | PDF    
Intro to DNS DNS and Security; DNS Tools in UNIX; Threats PPT | PDF    
Flaws In Cryptographic Protocols Freshness Flaws; Oracle Flaws (single and multi-); Type Flaws; Implementation-Dependent Flaws; Elimentary Flaws; Others PPT | PDF    

Lecture Notes

Title Topics Format Examples Notes
Risk Management Risk Management TXT | HTML    
Cybersecurity Cybersecurity TXT | HTML    
Building Secure Software Building Secure Software TXT | HTML   Dr. Probst
Security Overview Overview TXT | HTML   Dr. Probst
CIA, Pass 2 CIA TXT | HTML   Dr. Probst
Secure Operating Systems UNIX Considered Harmful TXT | HTML   Dr. Probst
SUID, Sandboxing, Firewalls UNIX cont'd TXT | HTML   Dr. Probst
Review of Cryptography Crypto TXT | HTML   Dr. Probst
Simple Cryptographic Examples Crypto 2 TXT | HTML   Dr. Probst
Firewalls Firewalls TXT | HTML   Dr. Probst
Design Principles for Security-Conscious Systems Design issues. TXT | HTML   Dr. Probst
Principles of "Network security" Network TXT | HTML   Dr. Probst
Supplement on Domain Name System (DNS) Security DNS TXT | HTML   Dr. Probst
Intrusion Detection Systems Intrusion Detection Systems PPT | PDF | TXT | HTML   PPT (and PDF) slides are primarily based on the .txt version of Dr. Probst's notes.
Denial of Service DoS and DDoS PPT | PDF    
SSL SSL PPT | PDF    
Flaws in Cryptographic Protocols Flaws. PPT | PDF   Same as in tutorials.
In restrospect... Review of all questions. PPT | PDF   Based on the recent and old archives.
Review for Final, A2 A2 solution and final exam issues. PPT | PDF    

Assignments and Deadlines

All assignments are due till midnight on a specified date. Don't forget the Submission Guidelines!!!




Home | Tutorials | Contacts | Site Map
Assignment Submission Guidelines | Grades

Maintained by Serguei A. Mokhov, mokhov@cs.concordia.ca
Last modified: Wednesday, 26-Oct-2005 07:46:09 EDT