Modules
The class is divied based on the high-level topics being covered. Each module listed on the sidebar has a list of lectures and associated resources based on that module.
The class is divied based on the high-level topics being covered. Each module listed on the sidebar has a list of lectures and associated resources based on that module.
How Chinese Criminals Steal Your Credit Card With Just One Text
Authentication is about determining that an entity, such as a person, has a desired property, such as knowing a password. The goal of authentication is ensuring that the system knows who is interacting with it and can therefore make later decisions, such as access control decisions, with confidence.
Access control is how the system manages access to various resources. Classically access control is defined in terms of who wants to perform what action on what resource and if that tripple of (who, action, resource) should be allowed.
Cryptography is the study of encryption approaches and is one of the most basic tools used in security. In this module we will cover some of the basic principles of cryptography and some of the most common cryptography aprroaches.
Security in Computing - Chapter 2.1 and 2.2
Encryption is not magic, it does not protect all things from all attacks, it is built on assumptions and like all tools is designed to perform specific tasks. Different types of cryptography are designed to solve different problems, think about the problems, constraints, and assumptions that can be made before selecting a cryptographic approach.
Difference between symetric and asymetric cryptography Keys, what they are for, assumptions about them, and what they do Stream and block ciphers
Think about the different tools that you use on a daily basis that claim they use encryption to protect you. Try looking up what kind of encryption they use and reason about why that type was chosen.
Networking is how we reliably move data between computers over unstable and sometimes untrusted connections managed by strangers.
Secure programming is a broad topic but roughly covers the security of operating systems and applications.
Below are some of the news stories cited in lecture or during the first 5 minutes.
Below are some capture the flag sources online. These are not required for the course, but you may find them interesting to try out.
Web security covers the security of web servers, browsers, users, and organizations that all interact over the Internet. This module starts with a quick course in how the Internet and websites function then moves on to more classic website attacks like Cross Site Scripting.
There are many deffinitions of privacy, in this class we learn a bit about those definitions including contextual privacy, user control over data flows, and privacy laws.