added an update
Updates
0 new
31
Recommendations
0 new
17
Followers
0 new
80
Reads
4 new
4080
Project log
Foundations of CyberSecurity, part II: Network Security,
Lecture Set 3: TCP/IP Stack Security: Poisoning, Injecting, and more
Covers:
Link-layer Security and Poisoning
Internet Protocol (IP) Security
IPsec
IP Spoofing
Fragmentation attacks
DNS poisoning
DNSSEC
Transport Layer Security
TCP injections and related attacks
Quic security
Lecture on spam and phishing, mostly focused on email. Covers SPF, DKIM, DMARC and more.
Included in part II (Network security) of `Foundations of Cybersecurity'.
An introduction to the basic cryptography involved in blockchains: digital signatures and hash functions. This can be useful as part of the `intro to cybersecurity' course (part I). The presentation was prepared for and presented as a tutorial in the Blockchain workshop, March 2019, ITAM (Mexico). No prior knowledge in crypto is required - this is very basic stuff. Includes most hash-functions properties (collision-resistance, one-way, but also Proof-of-Work and randomness-extraction).
This is an early draft of part II of the Foundations of Cybersecurity; this part focuses on Network Security.
It is an early draft and I post it here mostly since it already contains quite a few useful exercises. I am beginning slowly to add content; the chapter on Denial of Service, in particular, may already be of some use. I will also post the relevant lectures (presentations).
I would appreciate feedback on the outline (although even that isn't finalized), on specific exercises and content, and of course suggestions or requests for either exercises or content.
This is introductory presentation about Denial of Service (DoS) attacks, presentation-set 4 in the Foundations of Cybersecurity project, part II: Network security.
This is an improved version of the presentation (lecture) on public key infrastructure; I think it is already usable, although, there is yet much to improve, esp. related to advanced emerging PK schemes - I cover Certificate Transparency, but not deeply/clearly enough. I'll revise this when I prepare the corresponding chapter in the notes, but this will probably only be in several months.
A lecture covering the TLS and SSL protocols, mainly focusing on the handshake protocol. To be used with the lecture notes (also in researchgate) - part of Foundations of Cybersecurity project.
In this lecture set we discuss cryptographic hash functions, their properties, and (some of) their many applications, including: integrity (hash-block, blockchain), hash-then-sign, randomness, and more. The presentation should be most useful together with the course's lecture notes. Feedback appreciated.
This is lecture set 9 for the course `introduction to cybersecurity'. Updated Nov. 2018.
The lecture notes are also available as ResearchGate project; but this specific chapter will only be added in few months. Corrections, comments and suggestions on the lecture and on the notes would be appreciated!
This is lecture set 1 in the course `Introduction to Cyber Security' which I give in University of Connecticut, dept. of Computer Science and Engineering; see lecture notes and exercises (available in ResearchGate). This is work-in-progress and there are many comments and mistakes, please use with caution; corrections and suggestions are appreciated. This lecture set introduces encryption and pseudo-randomness.
This is a draft of volume I of the textbook `Foundations of Cybersecurity'. This volume is titled `An applied introduction to cryptography'. This course evolved from my lecture notes in `introduction to cyber-security' course, which I give in University of Connecticut. See my project for this text for presentations and more details. Comments, corrections and other feedback appreciated.















