CPSC 6136 - Advanced System Security Notes
Notes in PowerPoint
With Audio (requires PowerPoint viewer)
Chapter 1 - Overview of Computer Security
Chapter 1 - 15 minutes
Chapter 2 - Access Control Matrix
Chapter 2 - 18 minutes
Chapter 3 - Foundational Results
Chapter 3 - 5 minutes
Chapter 4 - Security Policies
Chapter 4 - 10 minutes
Chapter 5 - Confidentiality Policies
Chapter 5 - 12 minutes
Chapter 6 - Integrity Polcies
Chapter 6 - 27 minutes
Chapter 7 - Hybrid Policies
Chapter 7 - 10 minutes
Chapter 9 - Basic Cryptography
Terminology and Background
with narration
Algorithms and Uses of Encryption
with narration
Encryption animation
Chapter 9 - Key Management
Kerberos with narration
PKI with narration
Chapter 9 - 10 minutes
Chapter 10 - Cipher Techniques
Properties of Encryption Algorithms & Cryptanalysis
with narration
SSL with narration
(5 min)
IPSEC with narration
Chapter 10 - 6 minutes
Chapter 11 - Authentication
Chapter 11 - 20 minutes
Chapter 12 - Design Principles
Chapter 12 - 10 minutes
Chapter 13 - Representing Identity
Chapter 13 - 9 minutes
Chapter 14 - Access Control Mechanisms
Capability-based Access Control Mechanisms
Chapter 14 - 8 minutes
Chapter 15 - Information Flow
A Decentralized Model for Information Flow Control
Chapter 15 - minutes
Chapter 16 - Confinement Problem
Chapter 16 - 7 minutes
Chapter 17 - Introduction to Assurance
Chapter 17 - 7 minutes
Building Systems with Assurance
10 minutes
Chapter 18 - Evaluating Systems
Chapter 18 - 14 minutes
Chapter 19 - Malicious Code
Computer Viruses links
DEFINITIONS OF VIRUSES AND OTHER COMPUTER "VERMIN"
Chapter 3 (from 6126) - Program Security (without audio)
General Program Security and nonmalicious program errors with narration
Viruses and other malicious code and controls with narration
Chapter 19 - 8 minutes
Chapter 20 - Vulnerability Analysis
Chapter 20 - 7 minutes
Chapter 21 - Auditing
Chapter 21 - 5 minutes
Chapter 22 - Intrusion Detection
IDS presentation
(good discussion of Snort and Tripwire)
Chapter 22 - 12 minutes
Chapter 23 - Network Security
Firewalls
Introduction to Networking with narration
Vulnerabilities & Threats with narration
VPNs, PKIs, ISSs, SSLs with narration
IPSEC with narration
Kerberos with narration
Firewalls & Intrusion Detection with narration
Secure E-Mail, Multi-Layer and Total Security with narration
Chapter 23 - 10 minutes
Chapter 24 - Systems Security
Security Planning with narration
Risk Analysis with narration
Security Policies and Physical Security with narration
Chapter 24 - 10 minutes
Chapter 25 - User Security
File Protection Mechanisms and Paswords with narration
Social Engineering Fundamentals, Part I: Hacker Tactics
Social Engineering Fundamentals, Part II: Combat Strategies
Chapter 25 - 6 minutes
Chapter 26 - Program Security
General Program Security and nonmalicious program errors with narration
Chapter 26 - 14 minutes