Cyber Security Safeguards-Module 1
Introduction: What You Will Learn from This Course on Cyber Security
()
Assignments and Reading
()
Safeguards and Countermeasures
()
Reference Model
()
Orange Book Compliance
()
Bell La Padula Model
()
Biba Integrity Model
()
Issues with Subject-Object-Actions Models
()
Covert Channels
()
Information Flow Models and Hook-Up Theorem - Part 1
()
Information Flow Models and Hook-Up Theorem - Part 2
()
Welcome Kirsten Bay
()
Cyber Security Safeguards-Module 1 Assignments
Required: “Hookup Theorem,” D. McCullough
Required: “Password Security: A Case History,” Morris and Thompson
Video: “On Testing Theories,” Richard Feynman
Video: “The Security Mirage,” Bruce Schneier, TED Talk
Suggested: Introduction to Cyber Security, (Ch. 9 - 10)
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 9 – 10)
Understanding Authentication Protocols-Module 2
Assignments and Reading
()
Identification and Authentication
()
Factors of Authentication including 2FA
()
Authentication Protocol Schema and Zones
()
Passwords and Analysis
()
Hand-Held Authentication Protocol (Part 1: Implementation)
()
Hand-Held Authentication Protocol (Part 2: Analysis and Cryptanalysis)
()
Welcome Lior Frenkel
()
RSA SecureID Protocol (Part 1: Implementation)
()
RSA SecureID Protocol (Part 2: Analysis)
()
Understanding Authentication Protocols-Module 2 Assignments
Required: “Protection of Information in Computer Systems,” Saltzer and Schroeder
Required: “A Note on the Confinement Problem,” Lampson
Video: “The 1’s and 0’s behind Cyber Warfare” Chris Domas, TED Talk
Video: “The Growth of Cryptography,” Ronald Rivest
Suggested: Introduction to Cyber Security, (Ch. 11 - 12)
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 11 – 12)
Introducing Conventional Cryptography-Module 3
Assignments and Reading
()
Lamport’s S/Key Protocol (Part 1: Implementation)
()
Lamport’s S/Key Protocol (Part 2: Analysis)
()
Welcome Ajoy Kumar
()
Kerberos (Part 1: Implementation – TGT Issuance)
()
Kerberos (Part 2: Implementation – TBOB Issuance)
()
Basic Cryptosystems and Properties
()
Cryptographic Algorithm Design
()
DES Design
()
Triple-DES
()
Introducing Conventional Cryptography-Module 3 Assignments
Required: “Method of implementing the data encryption standard with reduced computation,” Patent US 7103180
Video: RSA Cyber Security with John Stewart, 2013
Suggested: Introduction to Cyber Security, (Ch. 13 - 14)
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 13 – 14)
Overview of Public Key Cryptographic Methods-Module 4
Assignments and Reading
()
CBC Mode Block Cryptography
()
Conventional Cryptography Scaling Issues
()
Public Key Crypto (Basics)
()
Public Key – Secrecy
()
Public Key – Digital Signature
()
Cryptographic Message Exchange
()
Diffie-Hellman Key Exchange
()
Key Distribution and Certification Authority
()
Secure Sockets Layer
()
The Story of James Ellis and Clifford Cox
()
Welcome Franscis Cianfrocca
()
Overview of Public Key Cryptographic Methods-Module 4 Assignments
Required: “New Directions in Cryptography,” Diffie and Hellman
Required: “Non-Secret Encryption,” James Ellis
Video: “A Brief History of Cryptography with Akamai Chief, Andy Ellis
Suggested: Introduction to Cyber Security, (Ch. 15 - 16)
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 15 – 16)