Building Secure Applications Theme Information

Building Secure Applications Theme Information

As various module documents are written and made available they will be linked from this page, so if you are studying this module you will need to keep coming back here regularly in order to stay up to date.

Module Documents

Module Guide

Assignments

Assignment 1

Downloadable Files

Some downloadable files are available

Theme Notes

Week 15

Lecture notes

Password based security systems

Entropy, random numbers and password generation.

Unix content

Introduction to Linux. Please complete the introductory command line tutorial.

Week 16

Lecture notes

Threats: Viruses, Worms and Trojans

Unix content

Pipes and filters

Please complete the pipes and filters tutorial.

Week 17

Lecture Notes

Virtual Private Networks

Network Firewalls

Unix content

Week 18

Lecture notes

Threats: Cross Site Scripting, SQL insertion and Buffer Overflow Exploits.

Week 19

Lecture notes

Symmetric cryptography and block ciphers

Unix content

Linux/Unix scripting and rapid application development.

Please complete as much as you can of the Unix scripting tutorial.

Week 20

Lecture notes

Asymmetric cryptography concepts

Unix content

Linux/Unix ownership, permissions and setuid.

Week 21

Lecture notes

Using the GNU Privacy Guard (GPG) Cryptography Program.

Unix content

Please complete the Unix security commands tutorial.

Week 22

Lecture notes

Prime numbers, modular exponentiation RSA and Diffie Hellman protocols.

Unix content

Please complete the Unix process and job control tutorial.

Week 23

Lecture notes

Laws concerning systems and applications security.

Unix content

Please follow and attempt to complete the Mounting, aptitude and file sharing tutorial. This tutorial introduces various systems administration concepts concerning software installation and configuration by walking you through a client server file sharing application install, helping you to learn how to administrate a typical Linux system. Please also read the manual pages for the commands and system files covered in the tutorial.

Week 24

Lecture notes

Copy prevention, steganography and DRM (Digital Restrictions Management).

Unix content

Using Gutsy hosts 1 and 2, please follow and attempt to complete the Linux network setup and diagnostics tutorial.

Week 25

Lecture notes

Security of accounting, finance and financial transaction proceedures and applications.

Tutorial content

After the break, students are invited to ask questions and raise issues concerning progress towards assignment aims and objectives.

Week 26

Lecture notes

Email security, Spam and Reputation as a Security Construct.

Tutorial content

Students are invited to discuss assignment development issues.