Sunday, April 14, 2013

Applications related to computer security :

https://www.google.ae/#q=computer+security&tbm=app&source=lnms&sa=X&ei=559rUZwahLKsB-TogdgE&ved=0CA0Q_AUoAw&bav=on.2,or.&fp=a45906aa5bb2bb79&biw=1024&bih=684




Get more information about computer security:





* http://en.wikipedia.org/wiki/Information_security

* http://www.cert.org/homeusers/HomeComputerSecurity/

links:


1.www.google.com.
2. www.gmail.com.
3 . www.hotmail.com
4. www.yahoo.com



 

 

 

Lecture 1

Topic: Introduction, risk analyses, ethics.
Slides: PDF. Required reading: Pfleeger and Pfleeger, Chapter 1 (Is There a Security Problem in Computing).

Lecture 2

Topic: Introduction, risk analyses, ethics.
Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 8.1 (Security Planning). Required reading: Pfleeger and Pfleeger, Section 8.2 (Risk Analysis).

Lecture 3

Guest lecturer: Pablos.
Required reading: Johnny Long, No-Tech Hacking. PDF available here: http://johnny.ihackstuff.com/downloads/task,doc_view/gid,38/. Optional: Pfleeger and Pfleeger, Section 8.4 (Physical Security).

Lecture 4

Topic: Software security: Issues and attacks.
Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 3.1 (Secure Programs). Required reading: Pfleeger and Pfleeger, Section 3.2 (Nonmalicious Program Errors).

Lecture 5

Topic: Software security: Issues and attacks.
Slides: PDF . Required reading: Aleph One, Smashing the Stack for Fun and Profit. Text file available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/stack.txt. Recommened reading (for project): scut / team teso, Exploiting Format String Vulnerabilities. PDF available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/formatstrings.pdf. Recommended reading (for project): Chien and Szor, Blended Attacks. PDF available here: http://www.peterszor.com/blended.pdf.

Sunday, March 3, 2013

Computer security
  •  Information security as applied to computers and networks.
  • The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.