{"id":265,"date":"2015-05-01T17:24:49","date_gmt":"2015-05-01T22:24:49","guid":{"rendered":"https:\/\/www.jsums.edu\/nmeghanathan\/?page_id=265"},"modified":"2015-05-01T18:13:59","modified_gmt":"2015-05-01T23:13:59","slug":"csc-437539-computer-security-fall-2013","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/nmeghanathan\/csc-437539-computer-security-fall-2013\/","title":{"rendered":"CSC 437\/539 Computer Security, Fall 2013"},"content":{"rendered":"<h4>\n\t<strong>Instructor: Dr. Natarajan Meghanathan<\/strong><br \/>\n<\/h4>\n<p>\n\t&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n\t<a href=\"#Syllabus\">Syllabus<\/a><br \/>\n\t<a href=\"#LectureSlides\">Lecture Slides<\/a><br \/>\n\t<a href=\"#DesktopVideos\">Desktop Recorded Videos<\/a><br \/>\n\t<a href=\"#ProjDesc\">Lab Project Descriptions<\/a><br \/>\n\t<a href=\"#QB\">Question Bank (Sample Questions)<\/a><br \/>\n\t<a href=\"#SuppModules\">Supplementary Modules and Notes (incl. Java Socket Programming Manual)<\/a><br \/>\n\t&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n\t&nbsp;\n<\/p>\n<h3>\n\t<a name=\"Syllabs\">Syllabus<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Syllabus.pdf\" target=\"_blank\">CSC 437 Fall 2013: Syllabus<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC539-Fall2013-Syllabus.pdf\" target=\"_blank\">CSC 539 Fall 2013: Syllabus<\/a>\n<\/p>\n<p>\n\t&nbsp;\n<\/p>\n<h3>\n\t<a name=\"LectureSlides\">Lecture Slides<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-1-Introduction-to-Computer-Security.pdf\" target=\"_blank\">Module 1: Introduction to Computer Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-2-CryptographicTools.pdf\" target=\"_blank\">Module 2: Cryptographic Tools<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-3-User-Authentication.pdf\" target=\"_blank\">Module 3: User Authentication<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-4-Access-Control.pdf\" target=\"_blank\">Module 4: Access Control<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-5-Buffer-Overflow-Attacks.pdf\" target=\"_blank\">Module 5: Buffer Overflow Attacks<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-6-Denial-of-Service-Attacks.pdf\" target=\"_blank\">Module 6: Denial of Service Attacks<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-7-Firewalls-IDS.pdf\" target=\"_blank\">Module 7: Firewalls and Intrusion Detection Systems<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-8-DatabaseSecurity.pdf\" target=\"_blank\">Module 8: Database Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Module-9-Fall2013-Malware.pdf\" target=\"_blank\">Module 9: Malware<\/a>\n<\/p>\n<p>\n\t&nbsp;\n<\/p>\n<h3>\n\t<a name=\"DesktopVideos\">Desktop Recorded Videos<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=MbfCFyXdH-I\" target=\"_blank\">Video to Show How to Setup Java Path in Windows 7<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=4dIhvDg2ib8\" target=\"_blank\">Modular Exponentiation Algorithm Examples<\/a>\n<\/p>\n<h3>\n\t<a name=\"Exam1Quiz23Review\">Review Videos for Exam 1 and Quizzes 2\/3<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=1RtKghlV1Qs\" target=\"_blank\">Part 1<\/a>&nbsp;&nbsp;&nbsp;&nbsp; <a href=\"http:\/\/www.youtube.com\/watch?v=4TRUdMf9mH4\" target=\"_blank\">Part 2<\/a>&nbsp;&nbsp;&nbsp;&nbsp; <a href=\"http:\/\/www.youtube.com\/watch?v=J2aaUITigZ0\" target=\"_blank\">Part 3<\/a>&nbsp;&nbsp;&nbsp;&nbsp;\n<\/p>\n<h3>\n\t<a name=\"ProjDesc\">Lab Project Descriptions<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Project-1-Email-Security-PGP.pdf\" target=\"_blank\">Project 1: PGP for E-mail Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Project-2-SSH-Commands.pdf\" target=\"_blank\">Project 2: Running Secure Shell (SSH) Server in a Virtual Machine Environment<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Project-3-DHCP-Snooping-DNS-Cache-Poisoning-MITM-Attack.pdf\" target=\"_blank\">Project 3: Simulating DHCP Snooping and DNS Cache Poisoning through a Man-in-the-Middle (MITM) Attack using Backtrack 5<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Project-4-StackSmashing-Attack.pdf\" target=\"_blank\">Project 4: Stack Smashing Attack on a C Program (Due: November 21, 2013: 7.30 PM<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Project-5-IPTables-Fall2013.pdf\" target=\"_blank\">Project 5: Use of IPTables in a Virtual Machine Environment<\/a>\n<\/p>\n<p>\n\t&nbsp;\n<\/p>\n<h3>\n\t<a name=\"QB\">Question Bank (Sample Questions)<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-1-Intro-to-ComputerSecurity.pdf\" target=\"_blank\">Sample Questions for Module 1: Introduction to Computer Security: Terminologies<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-2-Cryptographic-Tools.pdf\" target=\"_blank\">Sample Questions for Module 2: Cryptographic Tools<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-3-User-Authentication.pdf\" target=\"_blank\">Sample Questions for Module 3: User Authentication<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-4-AccessControl.pdf\" target=\"_blank\">Sample Questions for Module 4: Access Control Models<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-5-BufferOverflowAttacks.pdf\" target=\"_blank\">Sample Questions for Module 5: Buffer Overflow Attacks<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-6-Denial-of-Service-Attacks.pdf\" target=\"_blank\">Sample Questions for Module 6: Denial of Service Attacks<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-7-Firewalls-IDS.pdf\" target=\"_blank\">Sample Questions for Module 7: Firewalls and Intrusion Detection Systems<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-8-DBSecurity.pdf\" target=\"_blank\">Sample Questions for Module 8: Database Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-QB-Module-9-Malware.pdf\" target=\"_blank\">Sample Questions for Module 9: Malware<\/a>\n<\/p>\n<h3>\n\t&nbsp;<br \/>\n<\/h3>\n<h3>\n\t<a name=\"SuppModules\">Supplementary Modules and Notes<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Java-Socket-Programming-Manual.pdf\" target=\"_blank\">Manual on Socket Programming in Java<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Tutorial-Network-Security-Attacks-Controls.pdf\" target=\"_blank\">A Tutorial on Network Security: Attacks and Controls<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-Diffie-Hellman-Key-Exchange.pdf\" target=\"_blank\">Diffie-Hellman Key Exchange<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC437-Fall2013-DOS-Network-Tools-Commands.pdf\" target=\"_blank\">DOS Network Tools &#8211; Commands<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructor: Dr. Natarajan Meghanathan &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; Syllabus Lecture Slides Desktop Recorded Videos Lab Project Descriptions Question Bank (Sample Questions) Supplementary Modules and Notes (incl. Java Socket Programming Manual) &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; &nbsp; Syllabus CSC 437 Fall 2013: Syllabus CSC 539 Fall 2013: Syllabus &nbsp; Lecture Slides Module 1: Introduction to Computer Security Module 2: Cryptographic Tools Module 3: [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/265"}],"collection":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/comments?post=265"}],"version-history":[{"count":9,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/265\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/265\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/media?parent=265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}