Lecture Notes

Please use the following links to download the lecture notes for the course as they are made available. The notes are available in the Portable Document Format. You will need the Adobe Acrobat Reader to view and print the lecture notes.
  

Week 1  Handout 1 Basic security concepts, threats, vulnerabilities and risks Lecture 1  Lecture 2  Lecture 3
Week 2
 Handout 2.1
Handout 2.2
Discretionary access Control - Access Matrix Model, HRU & TAM, Current Trends
Lecture 4  Lecture 5  Lecture 6  Lecture 7
Week 3
 Handout 3.1
 Handout 3.2
Mandatory access Control - Bell-LaPadula model, Biba model, Information-flow model / Lattice-based models
Lecture 8  Lecture 9  Lecture 10
Week 4
Handout 4.1
Handout 4.2
Handout 4.3
Commercial Security - Lipner's Integrity Matrix Model, Clark Wilson Model and Brewer-Nash Model of Chinese Wall Policy; Chinese Wall as an Information Flow Model
Lecture 11  Lecture 12  Lecture 13  Lecture 14
Week 4/5
 Handout 5
Covert Channels
Lecture 15  Lecture 16
Week 6
 Handout 6.1
Role-Based Access Control
Lecture 16  Lecture 17
Week 7  Handout 7
 Handout 8
 Handout 9.1
 Handout 9.2
Security evaluation
(Note - The material on Trusted Computer System Evaluation Criteria is copyrighted US DoD, Common Criteria for Information Technology Security Evaluations is jointly copyrighted by the following agencies - Communications Security Establishment of Canada, Service Central de la Securite des Systemes d'Information of France, Bundesamt fur Sicherheit in der Informationstechnik of Germany, Communications-Electronics Security Group of the United Kingdom and National Institute of Standards and National Security Agency of the United States.)
Week 7/8  Handout 10 Introduction to cryptography - secret key vs public key, product ciphers, block ciphers and stream ciphers cryptanalysis
Lecture 17  Lecture 18  Lecture 19
Week 8  Handout 11 Secret key cryptosystems - DES, Triple-DES, modes of operation for DES, AES
Lecture 20  Lcture 21  Lecture 22
Week 9  Handout 12 Key Escrow - Clipper chip and Skipjack, Fortezza
Lecture 23
Week 9/10  Handout 13 Public key cryptography - Encryption and signature
Lecture 24
Week 11  Handout 14 Modular Arithmetic
Lecture 25
Week 11/12  Handout 15 Diffie-Hellman Cryptosystem
Lecture 25
Week 12  Handout 16 RSA Cryptosystem
Lecture 26
Week 12  Handout 17 El-Gamal, digital signature standard, Elliptic curve cryptography
Lecture 26
Week 12/13  Handout 18 Message digest, public key certificates - X.509 certificates, certification graph, certificate revocation
Lecture 27  Lecture 28
Week 13/14  Handout 19.1
 Handout 19.2
Identification and Authentication - Basis for authentication, different authentication mechanism. Biometric authentication
Lecture 29
Week 14  Handout 20 Password based authentication
Week 14  Handout 21 One time passwords and challenge response schemes
Lecture 30
Week 14/15  Handout 22 Mutual authentication protocols
Lecture 31  Lecture 32  Lecture 33
Week 14/15  Handout 23
Security protocols - SSL, SSH and S/MIME
Lecture 34  Lecture 35  Lecture 36
Week 15/16
Handout 25
Introduction to Privacy
Lecture 37