Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
cs-465:lectures [2017/09/19 08:32]
seamons
cs-465:lectures [2017/12/14 14:48]
seamons
Line 43: Line 43:
 ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange]
 ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol] ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol]
-** How does Eve conduct a Man-in-the-Middle attack?+** How does Mallory ​conduct a Man-in-the-Middle attack?
  
 * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]] * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]]
Line 58: Line 58:
 ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party] ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party]
 *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack] *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack]
-*** [http://support.microsoft.com/kb/293817 ​Verisign Attack 2001]+*** [https://en.wikipedia.org/wiki/Verisign#​Controversies ​Verisign Attack 2001]
  
 '''​Authentication'''​ '''​Authentication'''​
Line 71: Line 71:
 ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away]
 ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2] ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2]
- 
-* Strong Password Protocols ​ [[Media:​cs-465:​strongpasswordprotocols.pdf|pdf]] [[Media:​cs-465:​strongpasswordprotocols.pptx|pptx]] ​ 
  
 '''​Software Security'''​ '''​Software Security'''​
Line 85: Line 83:
  
 * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]] * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]]
- 
-'''​Stamp Course Lecture Slides'''​ 
- 
-* [http://​www.cs.sjsu.edu/​~stamp/​infosec/​powerpoint/​2_AccessControl.pptx Access Control] slides #4-52 
-* [http://​www.cs.sjsu.edu/​~stamp/​infosec/​powerpoint/​3_Protocols.pptx Protocols] slides #10-52 
  
cs-465/lectures.txt ยท Last modified: 2017/12/14 14:52 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0