This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
cs-465:lectures [2017/09/19 08:32] seamons |
cs-465:lectures [2017/12/14 14:48] seamons |
||
---|---|---|---|
Line 43: | Line 43: | ||
** [http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] | ** [http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] | ||
** [http://mathworld.wolfram.com/Diffie-HellmanProtocol.html Diffie-Hellman Protocol] | ** [http://mathworld.wolfram.com/Diffie-HellmanProtocol.html Diffie-Hellman Protocol] | ||
- | ** How does Eve conduct a Man-in-the-Middle attack? | + | ** How does Mallory conduct a Man-in-the-Middle attack? |
* RSA [[Media:cs-465:RSA.pdf|pdf]] [[Media:cs-465:RSA.pptx|pptx]] | * RSA [[Media:cs-465:RSA.pdf|pdf]] [[Media:cs-465:RSA.pptx|pptx]] | ||
Line 58: | Line 58: | ||
** [http://en.wikipedia.org/wiki/Trusted_third_party Trusted Third Party] | ** [http://en.wikipedia.org/wiki/Trusted_third_party Trusted Third Party] | ||
*** [http://en.wikipedia.org/wiki/DigiNotar DigiNotar attack] | *** [http://en.wikipedia.org/wiki/DigiNotar DigiNotar attack] | ||
- | *** [http://support.microsoft.com/kb/293817 Verisign Attack 2001] | + | *** [https://en.wikipedia.org/wiki/Verisign#Controversies Verisign Attack 2001] |
'''Authentication''' | '''Authentication''' | ||
Line 71: | Line 71: | ||
** [http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] | ** [http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] | ||
** [http://en.wikipedia.org/wiki/PBKDF2 PBKDF2] | ** [http://en.wikipedia.org/wiki/PBKDF2 PBKDF2] | ||
- | |||
- | * Strong Password Protocols [[Media:cs-465:strongpasswordprotocols.pdf|pdf]] [[Media:cs-465:strongpasswordprotocols.pptx|pptx]] | ||
'''Software Security''' | '''Software Security''' | ||
Line 85: | Line 83: | ||
* Social Engineering [[Media:cs-465:Social_Engineering.pdf|pdf]] [[Media:cs-465:Social_Engineering.pptx|pptx]] | * Social Engineering [[Media:cs-465:Social_Engineering.pdf|pdf]] [[Media:cs-465:Social_Engineering.pptx|pptx]] | ||
- | |||
- | '''Stamp Course Lecture Slides''' | ||
- | |||
- | * [http://www.cs.sjsu.edu/~stamp/infosec/powerpoint/2_AccessControl.pptx Access Control] slides #4-52 | ||
- | * [http://www.cs.sjsu.edu/~stamp/infosec/powerpoint/3_Protocols.pptx Protocols] slides #10-52 | ||