Introduction to Computer and Network Security [PDF]

Introduction and Overview. Overview of Computer Security (Lecture Notes: pdf) ... Firesheep Highlights Web Privacy Probl

3 downloads 16 Views 72KB Size

Recommend Stories


computer network security
If you want to go quickly, go alone. If you want to go far, go together. African proverb

Guide to Computer Network Security (Computer Communications and Networks)
Ask yourself: When I'm in physical or emotional pain, what are some of the best things I can do for

Network Security — Introduction
Silence is the language of God, all else is poor translation. Rumi

Introduction to Computer Security Download Book
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Introduction to Computer Science
Respond to every call that excites your spirit. Rumi

Introduction to Cyber Security
You have to expect things of yourself before you can do them. Michael Jordan

Introduction to ICS Security
There are only two mistakes one can make along the road to truth; not going all the way, and not starting.

Idea Transcript


Lecture Notes CS E 484: I ntroducti on to Com puter and Network S ecuri ty

Home

Syllabus

Labs

Lecture Notes

Introduction and Overview Overview of Computer Security (Lecture Notes: pdf)

Software Security Unix Security Basics (Lecture Notes: pdf) Users and Groups. File Permissions: access control, umask, chmod, chown, chgrp, Set-UID. Set-UID Programs and Vulnerabilities (Lecture Notes: pdf) Required Reading: Bishop: How to Write a Setuid Program Reading: Checklist for Security of Setuid Programs (a local copy) Vulnerabilities and Attacks Lecture Notes: Buffer_Overflow.pdf Race_Condition.pdf Input_Validation.pdf Format_String.pdf Buffer Overflow: Required Reading: Smashing The Stack For Fun And Profit (Aleph One) Heap Overflow: A heap of risk: Buffer overflows on the heap and how they are exploited Format String Required Reading: Exploiting Format Strng Vulnerabilities (scut / team teso) Race Condition: Required Reading: Secure programmer: Prevent race conditions (by David Wheeler) Input Validation Required Reading: Chapter 5: Secure Programming for Linux and Unix HOWTO (by David Wheeler) David Wheeler's book: Secure Programming for Linux and Unix HOWTO -- Creating Secure Software

Web Security (Lecture Notes: pdf) Basics of Web Security HTML, HTML5, HTTP, HTTPS, JavaScript, Apache, PHP. Session ID, Cookies, DOM objects Same Origin Policy (SOP) Vulnerabilities and Attacks Cross-Site Scripting (XSS) Attacks Required Reading: Cross-site Scripting from Wikipedia Required Reading: Cross-Site Scripting Worm and Virus News: Cross-Site Scripting Worm Floods MySpace Technical Details of the Samy Worm Cross-Site Request Forgery (CSRF) Attacks Required Reading: Cross-Site Request Forgeries: Exploitation and Prevention (A local copy) SQL Injection Attacks Required Reading: W3Schools: SQL Injection Steve Friedl's Unixwiz.net Tech Tips: SQL Injection Attacks by Example SQL Injection Comic OWASP's Top-10 List: The 10 Most Critical Web Application Security Vulnerabilities. ClickJacking Attacks UI Redressing: Attacks and Countermeasures Revisited Web Tracking and Privacy Required Reading: How Advertisers Use Internet Cookies to Track You (The Wall Street Journal, July 30, 2010). The Web's New Gold Mine: Your Secrets (The Wall Street Journal, July 30, 2010). Firesheep Highlights Web Privacy Problem (The Wall Street Journal, August 25, 2010). Facebook in Privacy Breach: Top-Ranked Applications Transmit Personal IDs, a Journal Investigation Finds (The Wall Street Journal, October 18, 2010). A Web Pioneer Profiles Users by Name (The Wall Street Journal, October 25, 2010).

Mobile Security Under Construction

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.