Lecture Notes

Please use the following links to download the lecture notes for the course as they are made available. If there is a "posted on" note against a topic description, it means that the corresponding lecture note has been revised recently on that date. In such case, please make sure to download the latest version.  The notes are available in the Portable Document Format. You will need the Adobe Acrobat Reader to view and print the lecture notes.

The class lectures are being recorded. You can access the video lectures from the course portal located here.
  

Week 1

Lecture #1
Basic security concepts, threats, vulnerabilities and risks (posted 08/26)
Week 2
Lecture #2.1
Lecture #2.2
Basic security concepts (continued) - malware (posted 09/02)
Basic security concepts (Continued) denial-of-service attacks, overflow and injection attacks (posted 09/04)
Week 3
Lecture #3.1
Lecture #3.2
Discretionary access Control - Access Matrix Model
HRU & TAM, Current Trends
Week 3/4
Lecture #3.3
Lecture #3.4
Mandatory access Control - Bell-LaPadula model
Biba model, Information-flow model / Lattice-based models
Week 4
Lecture #4.1
Lecture #4.2
Lecture #4.3
Commercial Security - Lipner's Integrity Matrix Model
Clark Wilson Model
Brewer-Nash Model of Chinese Wall Policy; Chinese Wall as an Information Flow Model
Week 4/5
Lecture #5
Covert Channels
Week 5/6
Lecture #6.1
Lecture #6.2
Role-Based Access Control
Spatio-temporal Access Control (Guest lecture)
Week 7 Lecture #7

Week 7/8 Lecture #8.1
Introduction to cryptography - secret key vs public key, product ciphers, block ciphers and stream ciphers, cryptanalysis
Week 8 Lecture #8.2
Secret key cryptosystems - DES, Triple-DES, modes of operation for DES, AES
Week 9 Lecture #9.1
Key Escrow - Clipper chip and Skipjack, Fortezza
Week 9/10 Lecture #9.2
Public key cryptography - Encryption and signature
Week 10 Lecture #10
Intro to modular Arithmetic and other mathematical concepts
Week 10/11 Lecture #11
Diffie-Hellman Cryptosystem, Diffie-Hellman man-in-the middle attack
Week 12 Lecture #12.1
RSA Cryptosystem
Week 12 Lecture #12.2
Lecture #12.3
El-Gamal, digital signature standard, Elliptic curve cryptography
Recent advances in cryptographic techniques - identity based encryption, proxy re-encryption, homomorphic encryption
Week 12/13 Lecture #13
Message digest, public key certificates - X.509 certificates, certification graph, certificate revocation
Week 13/14 Lecture #14.1
Lecture #14.2
Identification and Authentication - Basis for authentication, different authentication mechanisms.
Biometric authentication
Week 14 Lecture #14.3
Password based authentication
Week 14 Lecture #14.4
One time passwords and challenge response schemes
Week 14/15 Lecture #15.1
Mutual authentication protocols
Week 14/15 Lecture #15.2
Security protocols - IPSec, SSL, SSH and S/MIME
Week 15/16
Lecture #16
Introduction to Privacy, anonymizing protocols