Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cs-465:lectures [2017/09/19 08:25]
seamons
cs-465:lectures [2017/12/14 14:52] (current)
seamons
Line 31: Line 31:
 ** [http://​en.wikipedia.org/​wiki/​NIST_hash_function_competition SHA-3] ** [http://​en.wikipedia.org/​wiki/​NIST_hash_function_competition SHA-3]
 ** [http://​csrc.nist.gov/​groups/​ST/​hash/​index.html NIST Hash Project] ** [http://​csrc.nist.gov/​groups/​ST/​hash/​index.html NIST Hash Project]
 +** [https://​www.schneier.com/​blog/​archives/​2005/​02/​cryptanalysis_o.html Chinese researchers find first SHA-1 collision 2005]
 ** [https://​security.googleblog.com/​2017/​02/​announcing-first-sha1-collision.html Google announces practical collsion SHA-1, Feb 2017] ** [https://​security.googleblog.com/​2017/​02/​announcing-first-sha1-collision.html Google announces practical collsion SHA-1, Feb 2017]
  
Line 42: Line 43:
 ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange]
 ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol] ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol]
-** How does Eve conduct a Man-in-the-Middle attack?+** How does Mallory ​conduct a Man-in-the-Middle attack?
  
 * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]] * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]]
Line 57: Line 58:
 ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party] ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party]
 *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack] *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack]
-*** [http://support.microsoft.com/kb/293817 ​Verisign Attack 2001]+*** [https://en.wikipedia.org/wiki/Verisign#​Controversies ​Verisign Attack 2001]
  
 '''​Authentication'''​ '''​Authentication'''​
Line 70: Line 71:
 ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away]
 ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2] ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2]
- 
-* Strong Password Protocols ​ [[Media:​cs-465:​strongpasswordprotocols.pdf|pdf]] [[Media:​cs-465:​strongpasswordprotocols.pptx|pptx]] ​ 
  
 '''​Software Security'''​ '''​Software Security'''​
Line 84: Line 83:
  
 * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]] * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]]
 +** [https://​www.forbes.com/​sites/​laurashin/​2017/​01/​04/​be-prepared-the-top-social-engineering-scams-of-2017/#​41a335ce7fec Top Social Engineering Scams of 2017]
 +** [https://​www.forbes.com/​sites/​laurashin/​2017/​01/​04/​7-ways-to-make-yourself-hack-proof/#​41a402552b54 Ways to Make Yourself Hack Proof]
  
-'''​Stamp Course Lecture Slides'''​ 
- 
-* [http://​www.cs.sjsu.edu/​~stamp/​infosec/​powerpoint/​2_AccessControl.pptx Access Control] slides #4-52 
-* [http://​www.cs.sjsu.edu/​~stamp/​infosec/​powerpoint/​3_Protocols.pptx Protocols] slides #10-52 
  
cs-465/lectures.1505831146.txt.gz ยท Last modified: 2017/09/19 08:25 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0