DT145G Computer Security
You will find the study guide here [PDF]
[TeX].
This guide covers the entire course, all reading instructions are found there.
You find the lecture slides below.
The reading instructions to cover each lecture are found in the study guide above.
- Foundations of Security
[PDF]
[TeX]
- Identification and Authentication
[PDF]
[TeX]
- Information Theory
[PDF]
[TeX]
- Cryptographic Mechanisms, Part I
[PDF]
[TeX]
- Cryptographic Mechanisms, Part II
[PDF]
[TeX]
- Psychology and Social Engineering
[PDF]
[TeX]
- Access Control
[PDF]
[TeX]
- Reference Monitors
[PDF]
[TeX]
- Accountability and Non-Repudiation
[PDF]
[TeX]
- Software Security
[PDF]
[TeX]
- DRM and Trusted Computing
[PDF]
[TeX]
- Side-Channels
[PDF]
[TeX]
The following assignments are used in the course.
However, to hand them in and to get credits for them you need to be a registered student on the course.
The assignments prefixed with L are laboratory assignments, prefixed with S are seminars, and prefixed with H are hackathon assignments.
- L0 Breaking a Monoalphabetic Cipher
[PDF]
[TeX]
- L1 Password Cracking and Social Engineering
[PDF]
[TeX]
- S2 Password Policies
[PDF]
[TeX]
- L3 Host-Based Intrusion Detection Systems
[PDF]
[TeX]
- H4 Malicious Software
[PDF]
[TeX]
- H5 Digital Rights Management
[PDF]
[TeX]
- H6 Smashing the Stack
[PDF]
[TeX]
- S7 The Computer Engineer's Code of Ethics
[PDF]
[TeX]
$Id: index.html 1945 2014-09-02 08:14:45Z danbos $