ITEC345 slides, Spring 2024



Lecture 25 - international security standards

Lecture 24 - risk, assurance, & audits

Lecture 23 - legal

Lecture 22 - administration of security

Lecture 21 - SQL and OS injection attacks

Lecture 20 - Cross Site Request Forgeries - CSRF

Lecture 19 - XSS, the rest of the story

Lecture 18 - HTTP splitting, XSS

Lecture 17 - the break in

Lecture 16 - a process in memory

Lecture 15 - building an executable

Lecture 14 - networking, protocols, & sockets

Lecture 13 - exploits

Lecture 12 - cryptographic hash functions

Lecture 11 - asymmetric cryptography

Lecture 10 - AES algorithm

Lecture 9 - cryptography, Galois Fields, mathematics behind AES

Lecture 8 - cryptography, Introduction to block ciphers

Lecture 7 - cryptography, Linear Feedback Shift Registers

Lecture 6 - cryptography, stream ciphers

Lecture 5 - cryptography, introduction and history

Lecture 4 - segue to security, vocabulary

sync:
bits/bytes/basesGUI - command line equivalence
the Shell
underlying conceptstools and files

Lecture 1 - the nature of things, motivation