CPSC 6136 - Advanced System Security Notes


Notes in PowerPointWith Audio (requires PowerPoint viewer)
Chapter 1 - Overview of Computer SecurityChapter 1 - 15 minutes
Chapter 2 - Access Control MatrixChapter 2 - 18 minutes
Chapter 3 - Foundational ResultsChapter 3 - 5 minutes
Chapter 4 - Security PoliciesChapter 4 - 10 minutes
Chapter 5 - Confidentiality PoliciesChapter 5 - 12 minutes
Chapter 6 - Integrity PolciesChapter 6 - 27 minutes
Chapter 7 - Hybrid PoliciesChapter 7 - 10 minutes
Chapter 9 - Basic Cryptography
Chapter 9 - Key Management Chapter 9 - 10 minutes
Chapter 10 - Cipher Techniques Chapter 10 - 6 minutes
Chapter 11 - AuthenticationChapter 11 - 20 minutes
Chapter 12 - Design PrinciplesChapter 12 - 10 minutes
Chapter 13 - Representing IdentityChapter 13 - 9 minutes
Chapter 14 - Access Control Mechanisms Chapter 14 - 8 minutes
Chapter 15 - Information Flow Chapter 15 - minutes
Chapter 16 - Confinement ProblemChapter 16 - 7 minutes
Chapter 17 - Introduction to AssuranceChapter 17 - 7 minutes
Building Systems with Assurance10 minutes
Chapter 18 - Evaluating SystemsChapter 18 - 14 minutes
Chapter 19 - Malicious Code Chapter 19 - 8 minutes
Chapter 20 - Vulnerability AnalysisChapter 20 - 7 minutes
Chapter 21 - AuditingChapter 21 - 5 minutes
Chapter 22 - Intrusion Detection Chapter 22 - 12 minutes
Chapter 23 - Network Security Chapter 23 - 10 minutes
Chapter 24 - Systems Security Chapter 24 - 10 minutes
Chapter 25 - User Security Chapter 25 - 6 minutes
Chapter 26 - Program Security Chapter 26 - 14 minutes