Skip to main content

CSC 439/539 Advanced Information Security, Spring 2013

Instructor: Dr. Natarajan Meghanathan

—————————————————————–

Syllabus
Lecture Slides
Desktop Recorded Videos
Lecture Videos
Lab Projects
Quizzes and Exams
Question Bank (Sample Questions)  
——————————————————————————–

Syllabus

CSC 439 AIS (Undergraduate) Syllabus

CSC 539 AIS (Graduate) Syllabus

Lecture Slides

Module 1 – Number Theory and RSA Public Key Encryption

Module 2 – Key Distribution and Management

Module 3 – E-mail Security

Module 4 – Virtualization

Module 5 – Access Control Models

Module 6 – Web Security

Module 7 – Network Security

Module 8 – Secure Coding Standards and Verification

Code Snippets for Examples in Module 8 Slides

Module 9 – Malware

Module 10 – Steganography

Module 11 – Biometrics

Desktop Recorded Videos

Module 1 – Man in the Middle Attack on Public-Key Cryptography 

Module 1 – Quiz 1 Solutions

Module 1 – Basics of Modular Arithmetic

Module 1 – Modular Exponentiation

Module 1 – Euclid's Algorithm to find GCD

Module 1 – Number Theory Basics for RSA

Module 1 – RSA Example

Project 1 – Java Path Setup and Getting Started

Project 1 – Socket Programming Basics: Client-Server Program

Project 1 – Socket Programming with BigInteger

Project 1 – Socket Programming with BigInteger

 

Lab Projects

Project 1: Secure Client-Server Communication using RSA Algorithm, Due: Feb. 18
Seed Code for Project 1

Tutorial on Java Socket Programming

Project 2: PGP – GNU Privacy Guard (GPG) for Secure E-mail Communication, Due: March 4

Project 3: Use of CAPTCHA (Image Identification Strategy) to Prevent XSRF Attacks, Due: March 25
Files for Project 3

Project 4: SQL-Injection and Cross-Site Scripting Attacks and Controls, Due: April 8
Files for Project 4

Project 5: Use of GNU Debugger (GDB) for Reverse Engineering of C Programs in a Linux Platform, Due: April 22

Question Bank

Module 1 – Number Theory and Cryotpgraphy

Module 2 – Key Distribution and Management

Module 3 – Email Security

Module 4 – Virtualization

Module 5 – Access Control Models

Module 6 – Web Security

Module 7 – Network Security

Module 9 – Malware

Module 10 – Steganography

Module 11 – Biometrics