IT Security (S2, 2015)

Web Security

Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes. You can also download a printable PDF of the notes from last year.

HTTPS Protocol Stack Exchanging a Secret Key with Public Key Crypto Man-in-the-middle attack on Key Exchange Signing a Digital Certificate Certificate for Secret Key Exchange Attack on Certificate - Changed Public Key Attack on Certificate - Changed Signature Attack on Certificate - Fake CA

Return to: Course Home | Course List | Steven Gordon's Home | SIIT