Please
use
the
following links to download the lecture notes for the course as
they
are
made available. The notes are available in the Portable Document
Format.
You will need the Adobe Acrobat
Reader to view and print the lecture notes.
| Week 1 | Handout 1 | Basic security concepts, threats, vulnerabilities and
risks Lecture
1 Lecture 2
Lecture 3 |
| Week 2 |
Handout
2.1 Handout 2.2 |
Discretionary access Control - Access Matrix Model, HRU
&
TAM, Current Trends Lecture 4 Lecture 5 Lecture 6 Lecture 7 |
| Week 3 |
Handout 3.1
Handout 3.2 |
Mandatory access Control - Bell-LaPadula model, Biba
model,
Information-flow model / Lattice-based models Lecture 8 Lecture 9 Lecture 10 |
| Week 4 |
Handout 4.1 Handout 4.2 Handout 4.3 |
Commercial
Security
- Lipner's Integrity Matrix Model, Clark Wilson Model and
Brewer-Nash Model of Chinese Wall Policy; Chinese Wall as
an
Information Flow Model Lecture 11 Lecture 12 Lecture 13 Lecture 14 |
| Week 4/5 |
Handout
5 |
Covert Channels Lecture 15 Lecture 16 |
| Week 6 |
Handout 6.1 |
Role-Based Access Control Lecture 16 Lecture 17 |
| Week 7 | Handout 7
Handout 8 Handout 9.1 Handout 9.2 |
Security evaluation (Note - The material on Trusted Computer System Evaluation Criteria is copyrighted US DoD, Common Criteria for Information Technology Security Evaluations is jointly copyrighted by the following agencies - Communications Security Establishment of Canada, Service Central de la Securite des Systemes d'Information of France, Bundesamt fur Sicherheit in der Informationstechnik of Germany, Communications-Electronics Security Group of the United Kingdom and National Institute of Standards and National Security Agency of the United States.) |
| Week 7/8 | Handout 10 | Introduction to cryptography - secret key vs public key,
product ciphers, block ciphers and stream ciphers
cryptanalysis Lecture 17 Lecture 18 Lecture 19 |
| Week 8 | Handout 11 | Secret key cryptosystems - DES, Triple-DES, modes of
operation for
DES, AES Lecture 20 Lcture 21 Lecture 22 |
| Week 9 | Handout 12 | Key Escrow - Clipper chip and Skipjack, Fortezza Lecture 23 |
| Week 9/10 | Handout 13 | Public key cryptography - Encryption and signature Lecture 24 |
| Week 11 | Handout 14 | Modular Arithmetic Lecture 25 |
| Week 11/12 | Handout 15 | Diffie-Hellman Cryptosystem Lecture 25 |
| Week 12 | Handout 16 | RSA Cryptosystem Lecture 26 |
| Week 12 | Handout 17 | El-Gamal, digital signature standard, Elliptic curve
cryptography Lecture 26 |
| Week 12/13 | Handout 18 | Message digest, public key certificates - X.509
certificates,
certification graph, certificate revocation Lecture 27 Lecture 28 |
| Week 13/14 | Handout
19.1 Handout 19.2 |
Identification and Authentication - Basis for
authentication,
different authentication mechanism. Biometric
authentication Lecture 29 |
| Week 14 | Handout 20 | Password based authentication |
| Week 14 | Handout 21 | One time passwords and challenge response schemes Lecture 30 |
| Week 14/15 | Handout 22 | Mutual authentication protocols Lecture 31 Lecture 32 Lecture 33 |
| Week 14/15 | Handout
23 |
Security protocols - SSL, SSH and S/MIME Lecture 34 Lecture 35 Lecture 36 |
| Week 15/16 |
Handout
25 |
Introduction to Privacy Lecture 37 |