Return back courses page

BBM 463 - Information Security

Fall 2016

Instructor: Ahmet Burak Can
Class Time: Thursday, 9:15-12:00
Room: Computer Engineering Building, D9

Textbooks

  • Network Security: Private Communication in a Public World,
    2nd Edition. C. Kaufman, R. Perlman, and M. Speciner, Prentice-Hall
  • Security in Computing, C. P. Pfleeger and S. L. Pfleeger, Prentice Hall

Supplementary books

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, B. Schneier, John Wiley & Sons.
  • Handbook of Applied Cryptography. A. Menezes, P. van Oorschot and S. Vanstone. CRC Press
  • Security Engineering: A Guide to Building Dependable Distributed Systems, Ross J. Anderson, John Wiley & Sons

Grading

  • Midterm exam 1 (17/11/2016 09:30)- %25
  • Midterm exam 2 (22/12/2016 09:30)- %25
  • Final exam - %45
  • Class participation - %5

Communication

  • All class communication will be done via Piazza BBM463 communication group. Please register this group on Piazza.com.


Syllabus Resources
Introduction    
1x1     4x1
Wikipedia: Steganography
Another Page on Steganography
Network Security    
1x1     4x1
A Tutorial on Firewalls
A Tutorial on IDS/IPS
A Video Seminar on SIEM
Operating System Security    
1x1     4x1
Windows Access Control Lists
Another Page on Windows Access Control Lists
UNIX File Permissions
Wikipedia: UNIX setuid Bits
Wikipedia: UNIX chmod command
Another Page on Linux File Permissions
Malicious Software   
1x1     4x1
Wikipedia: Malware types
Wikipedia: Compute Viruses
Wikipedia: Rootkits
Wikipedia: Ransomware
Wikipedia: Internet Worms
Various Malware Examples:
Morris Worm   Code Red Worm   Carna Botnet  
Basic ciphers    
1x1     4x1
Wikipedia: Basic Ciphers
Wikipedia: Substitution Ciphers
Wikipedia: Enigma Machine
A Nice Page on Some Basic Ciphers
Another Page on Some Basic Ciphers
Block ciphers, Encryption modes and Stream ciphers    
1x1     4x1
Wikipedia: Block Ciphers
Wikipedia: Feistel Networks
Wikipedia: Data Encryption Standard (DES)
Wikipedia: Block Cipher Modes of Operation
Hash functions, message digests, HMAC    
1x1     4x1
Wikipedia: Hash Functions
Wikipedia: Message Authentication Codes
Number Theory, Public Key Cryptography, RSA    
1x1     4x1
Wikipedia: RSA
Digital signatures, Public key certificates, X509    
1x1     4x1
Wikipedia: Digital Signatures
Wikipedia: Digital Certificates
Wikipedia: Certificate Authority
Wikipedia: Public Key Infrastructure
Auhentication: Two-Three factor authentication, Biometrics, Smart Cards    
1x1     4x1
Wikipedia: Fingerprint Recognition
Wikipedia: Iris Recognition
Wikipedia: Various Types of Card Readers
Wikipedia: Smart cards
Wikipedia: One Time Password Protocols
Security Handshake    
1x1     4x1
Kerberos    
1x1     4x1
Kerberos Tutorial
Real-time Communication Security, SSL/TLS, IPSEC    
1x1     4x1
A Video Seminar on SSL
A Video Seminar on IPSEC
Secret Sharing (Threshold) Schemes    
1x1     4x1
Wikipedia: Shamir's Secret Sharing System

Acknowledgements

I thank to Prof. Cristina Nita-Rotaru at Noartheastern University, Prof. Ninghui Li at Purdue University and Prof. Ali Aydın Selçuk at TOBB ETU who shared their course slides with me. Slides of this course are mostly adapted from their slides.

References