Tuesday, April 16, 2013
Sunday, April 14, 2013
Applications related to computer security :
https://www.google.ae/#q=computer+security&tbm=app&source=lnms&sa=X&ei=559rUZwahLKsB-TogdgE&ved=0CA0Q_AUoAw&bav=on.2,or.&fp=a45906aa5bb2bb79&biw=1024&bih=684

Get more information about computer security:
* http://en.wikipedia.org/wiki/Information_security
* http://www.cert.org/homeusers/HomeComputerSecurity/
* http://en.wikipedia.org/wiki/Information_security
* http://www.cert.org/homeusers/HomeComputerSecurity/
Lecture 1
Topic: Introduction, risk analyses, ethics.Slides: PDF. Required reading: Pfleeger and Pfleeger, Chapter 1 (Is There a Security Problem in Computing).
Lecture 2
Topic: Introduction, risk analyses, ethics.Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 8.1 (Security Planning). Required reading: Pfleeger and Pfleeger, Section 8.2 (Risk Analysis).
Lecture 3
Guest lecturer: Pablos.Required reading: Johnny Long, No-Tech Hacking. PDF available here: http://johnny.ihackstuff.com/downloads/task,doc_view/gid,38/. Optional: Pfleeger and Pfleeger, Section 8.4 (Physical Security).
Lecture 4
Topic: Software security: Issues and attacks.Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 3.1 (Secure Programs). Required reading: Pfleeger and Pfleeger, Section 3.2 (Nonmalicious Program Errors).
Lecture 5
Topic: Software security: Issues and attacks.Slides: PDF . Required reading: Aleph One, Smashing the Stack for Fun and Profit. Text file available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/stack.txt. Recommened reading (for project): scut / team teso, Exploiting Format String Vulnerabilities. PDF available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/formatstrings.pdf. Recommended reading (for project): Chien and Szor, Blended Attacks. PDF available here: http://www.peterszor.com/blended.pdf.
Sunday, March 3, 2013
Computer security
- Information security as applied to computers and networks.
The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.
Subscribe to:
Posts (Atom)