ITEC345 slides, Spring 2024
Lecture 25 - international security standards
Lecture 24 - risk, assurance, & audits
Lecture 23 - legal
Lecture 22 - administration of security
Lecture 21 - SQL and OS injection attacks
Lecture 20 - Cross Site Request Forgeries - CSRF
Lecture 19 - XSS, the rest of the story
Lecture 18 - HTTP splitting, XSS
Lecture 17 - the break in
Lecture 16 - a process in memory
Lecture 15 - building an executable
Lecture 14 - networking, protocols, & sockets
Lecture 13 - exploits
Lecture 12 - cryptographic hash functions
Lecture 11 - asymmetric cryptography
Lecture 10 - AES algorithm
Lecture 9 - cryptography, Galois Fields, mathematics behind AES
Lecture 8 - cryptography, Introduction to block ciphers
Lecture 7 - cryptography, Linear Feedback Shift Registers
Lecture 6 - cryptography, stream ciphers
Lecture 5 - cryptography, introduction and history
Lecture 4 - segue to security, vocabulary
sync:
bits/bytes/bases
GUI - command line equivalence
the Shell
underlying concepts
tools and files
Lecture 1 - the nature of things, motivation