New Computer Security Slides [2020]
Some slides from the course taught at UCL in 2018-2020 by Nicolas Courtois under code COMP0054. Tutor: Nicolas T. Courtois. Full slides were only available to students in UCL Moodle for COMP0054. Here is a selection of slides (most of them are now in public domain):
- Part 01 about Computer Security Basic Principles / PPT.
- Part 02 about CompSec Theory and Models / PPT short 2020 / older long.
- Part 03 about CompSec at Hardware Level / PPT.
- Part 04 about Access Control in Unix and Windows / PPT.
- Part 05 about Authentication and Passwords / PPT from 2013.
- UPDATED: Part 06 about Secure Communications and TLS / PPT.
- Part 07 about Malware / PPT.
- Part 10 about Exploits / PPT from 2019 / super short condensed from 2016.
- Exam paper done by students at home due to COVID, from April 2020.
Some links on hacks and exploits.
- On insecurity of PCs: hacking management hardware / CPUs.
- Linux insecurity links: hacking Linux at a distance / hacking Linux for 9 years / root by pressing a key / famous Linux batch exploits / more.
Old Computer Security Slides [2013]:
These slides are from the course taught at UCL in 2009-2013 by Nicolas Courtois under codes COMPGA01 and COMPM062. Tutor: Nicolas T. Courtois.
Later taught by G. Danezis.
Part 00 – Overview slides.
Part 01 – slides about Computer Security Foundations and Principles – short version.
Part 01 – slides about Computer Security Foundations and Principles – standard version.
Part 01 – slides about Computer Security Foundations and Principles – long version.
Part 02a – slides about Access Control Theory Part A.
Part 02b – slides about Access Control Theory Part B.
Part 02c – slides about Access Control Theory Part C.
Part 02d – slides about Access Control Theory Part D.
Part 03 – slides about Computer Security at the Hardware/Memory/CPU Level.
Part 03 – slides about Computer Security at the Hardware/Memory/CPU Level – long version.
Part 04 – slides about Access Control in Unix and Windows.
Part 05 – slides about Crypto Authentication and Passwords.
Part 05 – slides about Long version: Cryptographic Message Authentication, Entity Authentication, Passwords, Challenge-Response, Time Stamping.
Part 06 – slides about Protocols, Symmetric Key Establishment, Kerberos.
Part 06 – slides about Protocols, PK Encr./Auth., PK Key Establishment, Secure Comm. in Open Networks, SSL/TLS.
Part 06 – slides about Hybrid Encryption, Email encryption, PGP.
Part 07 – slides about Malware.
Part 08 – slides about Networks and Network Security.
Part 09 – slides about Privacy, Data Protection and Legal Issues – super short version.
Part 09 – slides about Privacy, Data Protection and Legal Issues – long version.
Part 10 – slides about Exploits, Breaking Into Computers – short version.
Part 10 – slides about Exploits, Breaking Into Computers – longer version.
Part 11 – slides about Audit, Assurance, Common Criteria.
Exam from 2010, questions.
Exam from 2010 answers.
Exam from 2011 questions.
Exam from 2011 answers.
Exam from 2012 questions.
Exam from 2012 answers.
Exam from 2013 questions.
Exam from 2013 answers.
Tutorials questions.
Tutorials answers.
Last updated 18/12/2020