Next:
Introduction
G6077 — Introduction to Computer Security
Dr. Naercia Magaia
Dr. Imran Khan
Notes by Nathan Baines
Date:
Academic year 2025/26
Introduction
Assessment
Readings
Lecture Content Overview
Lab content overview
Key Security Concepts
Vulnerabilities, Threats, and Attacks
Vulnerabilities
Threats
Attacks — Threats carried out
Symmetric Cryptography
Attack Symmetric Encryption
Cryptanalytic attacks
Brute Force attacks
Data Encryption Standard
3DES
AES
Practical Issues
Cipher Block Chaining
Stream Ciphers
Message authentication
Cryptographic hash function
Public Key Cryptography
Digital Signatures
Public Key Certificate
Digital Envelope
Random Numbers
User Authentication
Assurance Levels
Potential Impact of security breaches
Password Authenticaton
Password Cracking
Memory Cards
Smart Tokens
Electronic Identity Cards
SmartPhones
Biometric authentication
Remote user authentication
Federated Identity Management
Access Control
Policies
Discretionary access control (DAC)
Mandatory access control (MAC)
Role-based access control (RBAC)
Attribute-based access control (ABAC)
UNIX File Access Control
About this document ...