Secure Computing - Table of Contents
Updated:
- In this series of notes, it will cover contents about software security, such as:
- Cryptography: the role of cryptography in security, modern cryptographic algorithms and their use in software development and encryption in computer networks.
- Risk management: threat modelling and risk assessment.
- Modes of attack: network protocols, malware and software vulnerabilities.
- Mitigation techniques: counter measures, authentication techniques (biometrics and two-factor authentication), penetration testing, secure systems design and intrusion detection.
- Ethical issues: ethics of security research, responsible disclosure and privacy.
Table of Contents
- Introduction
- Threat modelling
- Symmetric Ciphers
- Message authentication
- Public key cryptography
- Randomness
- User authentication
- TCP/IP networking threats
- Network defences
- Abuse of DNS, ARP & application protocols
- Command injection & input validation
- Buffer Overruns
- Low-level vulnerabilities
- Finding, reporting and avoiding vulnerabilities
- Intrusion Detection & incident response
Leave a comment