CS 5950: Computer Security and Information Assurance—Spring 2007
Slides and Announcements
Department of Computer Science
© 2007 by Leszek T. Lilien
Syllabus - main page: index.htm
Detailed course outline: outline.htm
Class slides and announcements (this page): slides+announcements.htm
Slides and Announcements
Lecture Section 1
(Chapter 1): Introduction to Security
Lecture
Section 2 (Ch.7, Part 1): Security in Networks – Part 1 (updated slightly on 2/17)
Announcement (2/17/07)
Here’s information on free
conversion to the PDF
format (from CS 6910 students).
Free
PDF Conversion
1) Mr. Hector Miguel Chavez Chavez wrote:
> This one is very good, you use it as a printer that way you can
> convert any kind of document and its free.
>
> http://www.acrosoftware.com/Products/CutePDF/writer.asp
Mr. Bill Hartman provides the original download site:
> a very nice piece of free pdf software called CutePDF.
>
> http://www.cutepdf.com/Products/CutePDF/writer.asp
2) Mr. Vrishal Kumar wrote:
> I know of two free softwares..
>
> 1. Primo PDF --> www.primopdf.com
> 2. PDF 995 --> www.pdf995.com
3) Mr. Amod Goyal wrote:
> I've been using these 2 services for PDF conversion:
>
> 1. http://www.pdfonline.com/
> unlimited conversion online & they send the converted file to the
> email address you specify without any advertisement or any such stuff in it
>
> 2. https://createpdf.adobe.com/
> upto 5 PDF conversion for 1 email address, so that you can always
> create any number of accounts for free with different email ids.
Lecture
Section 3 (Ch.2, Part 1): Introduction to Cryptology – Part 1 (added on 2/17)
Lecture
Section 4 (Ch.2, Part 2): Introduction to Cryptology – Part 2 (numbering of section fixed on 4/22)
Master
for Midterm Exam (PDF) (added on 3/17)
Lecture
Section 5 (Ch.7, Part 2): Security in Networks – Part 2 – SHORT version (numbering of section fixed on 4/22)
Optional
LONG version
(including material not required for exams: Lecture Section 5
(Ch.7, Part 2): Security in Networks – Part 2 – LONG version (numbering of section fixed on 4/22)
Lecture
Section 6 (Ch.3): Program Security – SHORT version (numbering of section fixed on 4/22)
Optional
LONG version
(including material not required for exams: Lecture Section 6 (Ch.3):
Program Security – LONG version (numbering of section fixed on 4/22)
Lecture
Section 7 (Ch.9): Legal, Privacy, and Ethical Issues in Computer Security (added on 4/22)
Topics for the final exam (added on 4/22)
Notes:
1.
Since the final exam is just a few days
following the last lecture (on "Legal, Privacy, and Ethical Issues in
Computer Security"), I have eliminated the requirements from this section
to bare necessities.
2.
As I have announced earlier, only material not
covered in the midterm exam will be covered in the final exam.
3.
As I mentioned a few times in class, additional
information can be obtained by taking a look at my earlier classes.
However, this must be done carefully, since the order of covering material (as
well as its depth) was different. Hence, the material covered for the
midterm/final exams was/is different in Spring 2007.
The example exams—both midterm and final, from which you need to select only
the relevant topics—are all accessible from my web pages. Start with:
http://www.cs.wmich.edu/~llilien/index.html#Teaching
and follow these links:
- CS 5950/6030—Computer
Security and Information Assurance, Spring 2006 (undergraduates/graduates)
- CS 5950/6030—Network Security, Fall 2005 (undergraduates/graduates)
© 2007 by Leszek T.
Lilien Last updated on 4/22/07, 1:31 a.m.