COURSE DESCRIPTION
An investigation of many aspects of modern information security. Major topics cover: Techniques to identify and avoid common software development flaws which leave software vulnerable to crackers. Utilizing modern operating systems security features to deploy software in a protected environment. Common threats to networks and networked computers and tools to deal with them. Cryptography and the role it plays in software development, systems security and network security.
Prerequisites: CSC209H5, 236H5, 290H5
In the news (you should at least browse these regularly)
- On hijacking internet traffic
- Linux Backdoor Attempt of 2013
- Vulnerabilities in Blackberry Backup
- You can find the latest information on software vulnerabilities at ExploitDB or CERT db
- Concerns about Apple's fingerprint technology
- See a pop talk on cybercrime (from Arnold)
- Check out Bruce Schneier's blog on information security
- On NSA and their attempts to control encryption
- Latest vulnerabilities in IE
Announcements
[12.12.2013] final exam info
[17.10.2013] Use UTM submit system to upload your project proposals.
[17.10.2013] Make sure to go to the tutorial on Friday Oct 18 to learn some crypto applications. You might find it useful for the exam.
[26.09.2013] I've updated the shellcode lecture notes.
[25.09.2013] I will not be in the office for my regular office hours on Sept 25. Instead, Andy will have an office hour on Sept 25, 3-4pm at CC3077. I will hold extra office hours on Oct 2, 2-5pm.
[12.09.2013] There will be a tutorial on Friday Sept 13.
[02.08.2013] Welcome to the course! Please check this page regularly for updates.