Next:
Introduction
G6077 — Introduction to Computer Security
Dr. Naercia Magaia
Dr. Imran Khan
Notes by Nathan Baines
Date:
Academic year 2025/26
Introduction
Assessment
Readings
Lecture Content Overview
Lab content overview
Key Security Concepts
Vulnerabilities, Threats, and Attacks
Vulnerabilities
Threats
Attacks — Threats carried out
Symmetric Cryptography
Attack Symmetric Encryption
Cryptanalytic attacks
Brute Force attacks
Data Encryption Standard
3DES
AES
Practical Issues
Cipher Block Chaining
Stream Ciphers
Message authentication
Cryptographic hash function
Public Key Cryptography
Digital Signatures
Public Key Certificate
Digital Envelope
Random Numbers
User Authentication
Assurance Levels
Potential Impact of security breaches
Password Authenticaton
Password Cracking
Memory Cards
Smart Tokens
Electronic Identity Cards
SmartPhones
Biometric authentication
Remote user authentication
Federated Identity Management
Access Control
Policies
Discretionary access control (DAC)
Mandatory access control (MAC)
Role-based access control (RBAC)
Attribute-based access control (ABAC)
UNIX File Access Control
Database Security
SQL Injection Attacks (SQLi)
Inband attacks
Inferential attack
Out-of-band attack
SQL injection countermeasures
Malicious Software
Attack kits
Attack sources
Advanced Persistent Threats
Viruses
Virus phases
Macro and Scripting Viruses
Virus classifications
Worms
Worm replication
About this document ...