COMPSCI642: Introduction to Information Security (001) FA19

COMPSCI642: Introduction to Information Security (001) FA19

Course Modules

Course topics, schedule, and lectures

Course topics, schedule, and lectures
Module Completed Module In Progress Module Locked
Course topics, schedule, and lectures 297105    
  • Course schedule (tentative)
    Course schedule (tentative) Course schedule (tentative)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Recorded Lectures
    Recorded Lectures Recorded Lectures
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Introduction to Information Security

Introduction to Information Security
Module Completed Module In Progress Module Locked
Introduction to Information Security 275492    
  • Slides (Sept 5): Introduction
    Slides (Sept 5): Introduction Slides (Sept 5): Introduction
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Gray hat hacking : The Ethical Hacker's Handbook
    Gray hat hacking : The Ethical Hacker's Handbook Gray hat hacking : The Ethical Hacker's Handbook
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975
    Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975 Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Cryptography

Cryptography
Module Completed Module In Progress Module Locked
Cryptography 285985    
  • Slides (Sept 10-17): Cryptography
    Slides (Sept 10-17): Cryptography Slides (Sept 10-17): Cryptography
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Sept 10: Symmetric Encryption
    Sept 10: Symmetric Encryption Sept 10: Symmetric Encryption
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Required) Cryptography Engineering (Ch: 1-4)
    (Required) Cryptography Engineering (Ch: 1-4) (Required) Cryptography Engineering (Ch: 1-4)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Sept 12: Hash function and MACs, Public-key encryption (part-1)
    Sept 12: Hash function and MACs, Public-key encryption (part-1) Sept 12: Hash function and MACs, Public-key encryption (part-1)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Required) Security Engineering (Chap: 5-6)
    (Required) Security Engineering (Chap: 5-6) (Required) Security Engineering (Chap: 5-6)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • HW1
    HW1 HW1
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness
    Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Number Theory Primer
    Number Theory Primer Number Theory Primer
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Required) Cryptography Engineering (Ch: 11, 12)
    (Required) Cryptography Engineering (Ch: 11, 12) (Required) Cryptography Engineering (Ch: 11, 12)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Twenty Years of Attacks on the RSA Cryptosystem
    Twenty Years of Attacks on the RSA Cryptosystem Twenty Years of Attacks on the RSA Cryptosystem
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

User Authentication

User Authentication
Module Completed Module In Progress Module Locked
User Authentication 285986    
  • Slides (Sept19-24) : User Authentication
    Slides (Sept19-24) : User Authentication Slides (Sept19-24) : User Authentication
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Passwords
    Passwords Passwords
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman
    *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • The password thicket: technical and market failures in human authentication on the web
    The password thicket: technical and market failures in human authentication on the web The password thicket: technical and market failures in human authentication on the web
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Biometrics authentication and human aspects of security
    Biometrics authentication and human aspects of security Biometrics authentication and human aspects of security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Biometrics: A Grand Challenge
    Biometrics: A Grand Challenge Biometrics: A Grand Challenge
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • An Introduction to Biometric Recognition
    An Introduction to Biometric Recognition An Introduction to Biometric Recognition
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Web Security

Web Security
Module Completed Module In Progress Module Locked
Web Security 285988    
  • Slides (Sept 26-Oct 1): Web security
    Slides (Sept 26-Oct 1): Web security Slides (Sept 26-Oct 1): Web security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Browser Security: Lessons from Google Chrome
    Browser Security: Lessons from Google Chrome Browser Security: Lessons from Google Chrome
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Advanced SQL Injection In SQL Server Applications
    Advanced SQL Injection In SQL Server Applications Advanced SQL Injection In SQL Server Applications
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • XSS_Explained.pdf
    XSS_Explained.pdf XSS_Explained.pdf
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Robust Defenses for Cross-Site Request Forgery, Barth et al.
    Robust Defenses for Cross-Site Request Forgery, Barth et al. Robust Defenses for Cross-Site Request Forgery, Barth et al.
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Clickjacking Vulnerability and Countermeasures
    Clickjacking Vulnerability and Countermeasures Clickjacking Vulnerability and Countermeasures
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Network Security

Network Security
Module Completed Module In Progress Module Locked
Network Security 285987    
  • Slides (Oct 3 ): TLS & Certificates
    Slides (Oct 3 ): TLS & Certificates Slides (Oct 3 ): TLS & Certificates
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Slides (Oct 8-17): N/w security
    Slides (Oct 8-17): N/w security Slides (Oct 8-17): N/w security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Oct 3) TLS and Certificate
    (Oct 3) TLS and Certificate (Oct 3) TLS and Certificate
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Transport Layer Security (TLS)
    Transport Layer Security (TLS) Transport Layer Security (TLS)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Oct 8) Security of DNS and BGP routing
    (Oct 8) Security of DNS and BGP routing (Oct 8) Security of DNS and BGP routing
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Primer on DNS
    Primer on DNS Primer on DNS
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • DNS cache poisoning, by Steve Friedl
    DNS cache poisoning, by Steve Friedl DNS cache poisoning, by Steve Friedl
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • A Survey of BGP Security
    A Survey of BGP Security A Survey of BGP Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Oct 10) TCP/IP/Link layer Security
    (Oct 10) TCP/IP/Link layer Security (Oct 10) TCP/IP/Link layer Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • A Look Back at 'Security Problems in the TCP/IP Protocol Suite
    A Look Back at 'Security Problems in the TCP/IP Protocol Suite A Look Back at 'Security Problems in the TCP/IP Protocol Suite
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks
    Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Sept 17) WiFi security, Firewall and IDS
    (Sept 17) WiFi security, Firewall and IDS (Sept 17) WiFi security, Firewall and IDS
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Wireshark tutorial (references)
    Wireshark tutorial (references) Wireshark tutorial (references)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Introducing Nmap
    Introducing Nmap Introducing Nmap
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection.pdf
    Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection.pdf Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection.pdf
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

OS Security

OS Security
Module Completed Module In Progress Module Locked
OS Security 285990    

Hardware Security

Hardware Security
Module Completed Module In Progress Module Locked
Hardware Security 285991    
  • Exploiting the DRAM Rowhammer bug to gain kernel privileges
    Exploiting the DRAM Rowhammer bug to gain kernel privileges Exploiting the DRAM Rowhammer bug to gain kernel privileges
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Miscellaneous

Miscellaneous
Module Completed Module In Progress Module Locked
Miscellaneous 288139    
  • Why Information Security is Hard – An Economic Perspective, Ross Anderson
    Why Information Security is Hard – An Economic Perspective, Ross Anderson Why Information Security is Hard – An Economic Perspective, Ross Anderson
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Why Cryptosystems Fail, Ross Anderson
    Why Cryptosystems Fail, Ross Anderson Why Cryptosystems Fail, Ross Anderson
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Computer Security Impaired by Legitimate Users
    Computer Security Impaired by Legitimate Users Computer Security Impaired by Legitimate Users
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
   
minimum score must view must submit must contribute