Please
use the following links to download the lecture notes for the
course as they are made available. If there is a "posted on"
note against a topic description, it means that the
corresponding lecture note has been revised recently on that
date. In such case, please make sure to download the latest
version. The notes are available in the Portable Document
Format. You will need the Adobe Acrobat
Reader to view and print the lecture notes.
The
class lectures are being recorded. You can access the video
lectures from the course portal located here.
| Week 1 |
Lecture #1 |
Basic security concepts, threats, vulnerabilities and
risks (posted 08/26) |
| Week 2 |
Lecture
#2.1 Lecture #2.2 |
Basic security concepts (continued) -
malware (posted 09/02) Basic security concepts (Continued) denial-of-service attacks, overflow and injection attacks (posted 09/04) |
| Week 3 |
Lecture
#3.1 Lecture #3.2 |
Discretionary access Control - Access Matrix Model HRU & TAM, Current Trends |
| Week 3/4 |
Lecture #3.3 Lecture #3.4 |
Mandatory access Control - Bell-LaPadula
model Biba model, Information-flow model / Lattice-based models |
| Week 4 |
Lecture #4.1 Lecture #4.2 Lecture #4.3 |
Commercial
Security
- Lipner's Integrity Matrix Model Clark Wilson Model Brewer-Nash Model of Chinese Wall Policy; Chinese Wall as an Information Flow Model |
| Week 4/5 |
Lecture #5 |
Covert Channels |
| Week 5/6 |
Lecture #6.1 Lecture #6.2 |
Role-Based Access Control Spatio-temporal Access Control (Guest lecture) |
| Week 7 | Lecture #7 |
|
| Week 7/8 | Lecture #8.1 |
Introduction to cryptography - secret key vs public key,
product ciphers, block ciphers and stream ciphers,
cryptanalysis |
| Week 8 | Lecture
#8.2 |
Secret key cryptosystems - DES, Triple-DES, modes of
operation for DES, AES |
| Week 9 | Lecture #9.1 |
Key Escrow - Clipper chip and Skipjack, Fortezza |
| Week 9/10 | Lecture
#9.2 |
Public key cryptography - Encryption and signature |
| Week 10 | Lecture #10 |
Intro to modular Arithmetic and other mathematical
concepts |
| Week 10/11 | Lecture #11 |
Diffie-Hellman Cryptosystem, Diffie-Hellman man-in-the
middle attack |
| Week 12 | Lecture #12.1 |
RSA Cryptosystem |
| Week 12 | Lecture
#12.2 Lecture #12.3 |
El-Gamal, digital signature standard, Elliptic curve
cryptography Recent advances in cryptographic techniques - identity based encryption, proxy re-encryption, homomorphic encryption |
| Week 12/13 | Lecture #13 |
Message digest, public key certificates - X.509
certificates, certification graph, certificate revocation |
| Week 13/14 | Lecture #14.1 Lecture #14.2 |
Identification and Authentication - Basis for
authentication, different authentication mechanisms. Biometric authentication |
| Week 14 | Lecture #14.3 |
Password based authentication |
| Week 14 | Lecture #14.4 |
One time passwords and challenge response schemes |
| Week 14/15 | Lecture
#15.1 |
Mutual authentication protocols |
| Week 14/15 | Lecture
#15.2 |
Security protocols - IPSec, SSL, SSH and S/MIME |
| Week 15/16 |
Lecture
#16 |
Introduction to Privacy, anonymizing
protocols |