CS 5950: Computer Security and Information Assurance—Spring 2007

Slides and Announcements

Prof. Leszek Lilien

Department of Computer Science

Western Michigan University

© 2007 by Leszek T. Lilien

Class Web Pages:

Syllabus - main page: index.htm

Detailed course outline: outline.htm

Class slides and announcements (this page): slides+announcements.htm

 

 

Slides and Announcements

Lecture Section 1 (Chapter 1): Introduction to Security

Lecture Section 2 (Ch.7, Part 1): Security in Networks – Part 1  (updated slightly on 2/17)

 

Announcement (2/17/07)

Here’s information on free conversion to the PDF  format (from CS 6910 students).

 

Free PDF Conversion

 

1) Mr. Hector Miguel Chavez Chavez wrote:

> This one is very good, you use it as a printer that way you can

> convert any kind of document and its free.

> 

> http://www.acrosoftware.com/Products/CutePDF/writer.asp

 

   Mr. Bill Hartman provides the original download site:

   > a very nice piece of free pdf software called CutePDF.
   >

   > http://www.cutepdf.com/Products/CutePDF/writer.asp

 

2) Mr. Vrishal Kumar wrote:

>  I know of two free softwares..

> 

> 1. Primo PDF --> www.primopdf.com

> 2. PDF 995 --> www.pdf995.com

 

3) Mr. Amod Goyal wrote:

> I've been using these 2 services for PDF conversion:

> 

> 1. http://www.pdfonline.com/

>     unlimited conversion online & they send the converted file to the

> email address you specify without any advertisement or any such stuff in it

> 

> 2. https://createpdf.adobe.com/

>     upto 5 PDF conversion for 1 email address, so that you can always

> create any number of accounts for free with different email ids.

Lecture Section 3 (Ch.2, Part 1): Introduction to Cryptology – Part 1  (added on 2/17)

Lecture Section 4 (Ch.2, Part 2): Introduction to Cryptology – Part 2  (numbering of section fixed on 4/22)

Master for Midterm Exam (PDF) (added on 3/17)

Lecture Section 5 (Ch.7, Part 2): Security in Networks – Part 2 – SHORT version (numbering of section fixed on 4/22)

Optional LONG version (including material not required for exams: Lecture Section 5 (Ch.7, Part 2): Security in Networks – Part 2 – LONG version  (numbering of section fixed on 4/22)

Lecture Section 6 (Ch.3): Program Security – SHORT version  (numbering of section fixed on 4/22)

Optional LONG version (including material not required for exams: Lecture Section 6 (Ch.3): Program Security – LONG version  (numbering of section fixed on 4/22)

Lecture Section 7 (Ch.9): Legal, Privacy, and Ethical Issues in Computer Security  (added on 4/22)

 

Topics for the final exam (added on 4/22)

Notes:

1.      Since the final exam is just a few days following the last lecture (on "Legal, Privacy, and Ethical Issues in Computer Security"), I have eliminated the requirements from this section to bare necessities.

2.      As I have announced earlier, only material not covered in the midterm exam will be covered in the final exam.

3.      As I mentioned a few times in class, additional information can be obtained by taking a look at my earlier classes.
However, this must be done carefully, since the order of covering material (as well as its depth) was different. Hence, the material covered for the midterm/final exams was/is different in Spring 2007.
The example exams—both midterm and final, from which you need to select only the relevant topics—are all accessible from my web pages. Start with:
   http://www.cs.wmich.edu/~llilien/index.html#Teaching
and follow these links:

- CS 5950/6030—Computer Security and Information Assurance, Spring 2006 (undergraduates/graduates)
- CS 5950/6030—Network Security, Fall 2005 (undergraduates/graduates)

 

© 2007 by Leszek T. Lilien                                                                                      Last updated on 4/22/07, 1:31 a.m.