{"id":309,"date":"2015-05-01T18:28:48","date_gmt":"2015-05-01T23:28:48","guid":{"rendered":"https:\/\/www.jsums.edu\/nmeghanathan\/?page_id=309"},"modified":"2015-05-01T18:59:03","modified_gmt":"2015-05-01T23:59:03","slug":"csc-439539-advanced-information-security-spring-2013","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/nmeghanathan\/csc-439539-advanced-information-security-spring-2013\/","title":{"rendered":"CSC 439\/539 Advanced Information Security, Spring 2013"},"content":{"rendered":"<p>\n\t<strong style=\"line-height: 1.2em\"><span style=\"line-height: 1.2em\">Instructor: Dr. Natarajan Meghanathan<\/span><\/strong>\n<\/p>\n<h3>\n\t&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\n<\/h3>\n<p>\n\t<a href=\"#Syllabus\">Syllabus<\/a><br \/>\n\t<a href=\"#LectureSlides\">Lecture Slides<\/a><br \/>\n\t<a href=\"#DesktopVideos\">Desktop Recorded Videos<\/a><br \/>\n\t<a href=\"#LectureVideos\">Lecture Videos<\/a><br \/>\n\t<a href=\"#LabProjects\">Lab Projects<\/a><br \/>\n\t<a href=\"#QuizExams\">Quizzes and Exams<\/a><br \/>\n\t<a href=\"#QuestionBank\">Question Bank (Sample Questions)<\/a>&nbsp;&nbsp;<br \/>\n\t<span style=\"line-height: 1.6em\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/span>\n<\/p>\n<h3>\n\t<a name=\"Syllabus\">Syllabus<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-AIS-syllabus.pdf\" target=\"_blank\">CSC 439 AIS (Undergraduate) Syllabus<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC539-Sp2013-AIS-syllabus.pdf\" target=\"_blank\">CSC 539 AIS (Graduate) Syllabus<\/a>\n<\/p>\n<h3>\n\t<a name=\"LectureSlides\">Lecture Slides<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-1-Number-Theory-and-RSA-Public-Key-Encryption.pdf\" target=\"_blank\">Module 1 &#8211; Number Theory and RSA Public Key Encryption<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-2-Key-Distribution-and-Management.pdf\" target=\"_blank\">Module 2 &#8211; Key Distribution and Management<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Module-3-E-mail-Security.pdf\" target=\"_blank\">Module 3 &#8211; E-mail Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-4-Virtualization.pdf\" target=\"_blank\">Module 4 &#8211; Virtualization<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-5-Access-Control-Models.pdf\" target=\"_blank\">Module 5 &#8211; Access Control Models<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Module-6-Web-Security.pdf\" target=\"_blank\">Module 6 &#8211; Web Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-7-Network-Security.pdf\" target=\"_blank\">Module 7 &#8211; Network Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-8-Secure-Coding-Standards_-reduced.pdf\" target=\"_blank\">Module 8 &#8211; Secure Coding Standards and Verification<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/143.132.8.23\/cms\/tues\/docs\/CSC439-AIS-Spring2013\/Code-Module-8-SecureCodingExamples.zip\" target=\"_blank\">Code Snippets for Examples in Module 8 Slides<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Module-9-Spring2013-Malware.pdf\" target=\"_blank\">Module 9 &#8211; Malware<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-10-Steganography.pdf\" target=\"_blank\">Module 10 &#8211; Steganography<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-11-Biometrics-for-Information-Security.pdf\" target=\"_blank\">Module 11 &#8211; Biometrics<\/a>\n<\/p>\n<h3>\n\t<a name=\"DesktopVideos\">Desktop Recorded Videos<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=sjLpxHOIOGc\" target=\"_blank\">Module 1 &#8211; Man in the Middle Attack on Public-Key Cryptography<\/a>&nbsp;\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=G4Du0qJVbSM\" target=\"_blank\">Module 1 &#8211; Quiz 1 Solutions<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=O1FZ9JxqB6g\" target=\"_blank\">Module 1 &#8211; Basics of Modular Arithmetic<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=KHTdbb8xl3s\" target=\"_blank\">Module 1 &#8211; Modular Exponentiation<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=SNJq2f0vXwc\" target=\"_blank\">Module 1 &#8211; Euclid&#039;s Algorithm to find GCD<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=1-rr1B7fPRw\" target=\"_blank\">Module 1 &#8211; Number Theory Basics for RSA<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=yQF-0COrM-w\" target=\"_blank\">Module 1 &#8211; RSA Example<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=toHuNVqeUQ4\" target=\"_blank\">Project 1 &#8211; Java Path Setup and Getting Started<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=fUvMz4ImbCs\" target=\"_blank\">Project 1 &#8211; Socket Programming Basics: Client-Server Program<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=ZXuLF4BSspw\" target=\"_blank\">Project 1 &#8211; Socket Programming with BigInteger<\/a>\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=ZXuLF4BSspw\" target=\"_blank\">Project 1 &#8211; Socket Programming with BigInteger<\/a>\n<\/p>\n<p>\n\t&nbsp;\n<\/p>\n<h3>\n\t<a name=\"LabProjects\">Lab Projects<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Project-1-RSA-Encryption.pdf\" target=\"_blank\">Project 1: Secure Client-Server Communication using RSA Algorithm<\/a>, Due: Feb. 18<br \/>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Seed-Code-for-Project-1.pdf\" target=\"_blank\">Seed Code for Project 1<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Java-Socket-Programming-Tutorial.pdf\" target=\"_blank\">Tutorial on Java Socket Programming<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Project-2-Email-Security-PGP.pdf\" target=\"_blank\">Project 2: PGP &#8211; GNU Privacy Guard (GPG) for Secure E-mail Communication<\/a>, Due: March 4\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Project-3-CAPTCHA-SHORTER-Version-Project.pdf\" target=\"_blank\">Project 3: Use of CAPTCHA (Image Identification Strategy) to Prevent XSRF Attacks<\/a>, Due: March 25<br \/>\n\t<a href=\"http:\/\/143.132.8.23\/cms\/tues\/docs\/CSC439-AIS-Spring2013\/Files-for-Project-3-CAPTCHA-SHORTER-Version-Project-OnlineBankingAppArchive.zip\" target=\"_blank\">Files for Project 3<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Project-4-SQL-XSS-Attacks-Controls.pdf\" target=\"_blank\">Project 4: SQL-Injection and Cross-Site Scripting Attacks and Controls<\/a>, Due: April 8<br \/>\n\t<a href=\"http:\/\/143.132.8.23\/cms\/tues\/docs\/CSC439-AIS-Spring2013\/Files-for-Project-4-SQL-XSS-Attack-Project-Buy-More Online Application Archive.zip\" target=\"_blank\">Files for Project 4<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-Project-5-GDB-revised.pdf\" target=\"_blank\">Project 5: Use of GNU Debugger (GDB) for Reverse Engineering of C Programs in a Linux Platform<\/a>, Due: April 22\n<\/p>\n<h3>\n\t<a name=\"QuestionBank\">Question Bank<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-1-NumberTheory-Cryptography.pdf\" target=\"_blank\">Module 1 &#8211; Number Theory and Cryotpgraphy<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-SampleQuestions-Module-2-Key-Distribution-Management.pdf\" target=\"_blank\">Module 2 &#8211; Key Distribution and Management<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-3-Email-Security.pdf\" target=\"_blank\">Module 3 &#8211; Email Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-SampleQuestions-Module-4-Virtualization.pdf\" target=\"_blank\">Module 4 &#8211; Virtualization<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-5-Access-Control-Models.pdf\" target=\"_blank\">Module 5 &#8211; Access Control Models<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-6-Web-Security.pdf\" target=\"_blank\">Module 6 &#8211; Web Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-7-NetworkSecurity.pdf\" target=\"_blank\">Module 7 &#8211; Network Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-9-Malware.pdf\" target=\"_blank\">Module 9 &#8211; Malware<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-10-Steganography.pdf\" target=\"_blank\">Module 10 &#8211; Steganography<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC439-Sp2013-QB-Module-11-biometrics.pdf\" target=\"_blank\">Module 11 &#8211; Biometrics<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructor: Dr. Natarajan Meghanathan &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; Syllabus Lecture Slides Desktop Recorded Videos Lecture Videos Lab Projects Quizzes and Exams Question Bank (Sample Questions)&nbsp;&nbsp; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; Syllabus CSC 439 AIS (Undergraduate) Syllabus CSC 539 AIS (Graduate) Syllabus Lecture Slides Module 1 &#8211; Number Theory and RSA Public Key Encryption Module 2 &#8211; Key Distribution and Management Module 3 [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/309"}],"collection":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":9,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/309\/revisions"}],"predecessor-version":[{"id":349,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/309\/revisions\/349"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/media?parent=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}