As various module documents are written and made available they will be linked from this page, so if you are studying this module you will need to keep coming back here regularly in order to stay up to date.
Some downloadable files are available
Password based security systems
Entropy, random numbers and password generation.
Introduction to Linux. Please complete the introductory command line tutorial.
Threats: Viruses, Worms and Trojans
Pipes and filters
Please complete the pipes and filters tutorial.
Virtual Private Networks
Threats: Cross Site Scripting, SQL insertion and Buffer Overflow Exploits.
Symmetric cryptography and block ciphers
Linux/Unix scripting and rapid application development.
Please complete as much as you can of the Unix scripting tutorial.
Asymmetric cryptography concepts
Linux/Unix ownership, permissions and setuid.
Using the GNU Privacy Guard (GPG) Cryptography Program.
Please complete the Unix security commands tutorial.
Prime numbers, modular exponentiation RSA and Diffie Hellman protocols.
Please complete the Unix process and job control tutorial.
Laws concerning systems and applications security.
Please follow and attempt to complete the Mounting, aptitude and file sharing tutorial. This tutorial introduces various systems administration concepts concerning software installation and configuration by walking you through a client server file sharing application install, helping you to learn how to administrate a typical Linux system. Please also read the manual pages for the commands and system files covered in the tutorial.
Copy prevention, steganography and DRM (Digital Restrictions Management).
Security of accounting, finance and financial transaction proceedures and applications.
After the break, students are invited to ask questions and raise issues concerning progress towards assignment aims and objectives.
Email security, Spam and Reputation as a Security Construct.
Students are invited to discuss assignment development issues.