Assignment
- Week 1 (8/25): Read Chapter 1 of Security Engineering, MetaSploit Version 3.2 user guide. Browse the introduction pdf presentation. Make sure your ufp account is up to date and you can login to EN138 PCs with that account. Check with me early Wednesday before class if this is the first time you access EN138 lab.
- Week 2 (9/1): Read Basic Cryptography viewgraph, Chapter 5 of "Security Engineeering" or Chapter 8 of "Computer Network" by Tanenbaum (if have one or check out from library).
- Week 3 (9/8): Read “Smashing The Stack For Fun And Profit,” by Aleph One. Browser the buffer overflow viewgraph.
- Week 4 (9/15): Read “On the Effectiveness of Address-Space Randomization,” by Shacham et al at Stanford's applied crypto group at ACM Computer Communication Security Conference 2004.
- Week 5 (9/21): Read VMWare Server 2 user guide. Read Chapter 2 of "Security Engineering"
- Week 6 (9/28): Read
Secure Web Access Web page
- Week 7 (10/5):
Read Chapter 18, Network Attack and Defense.Security Engineeri. Sec. 18.3.2 is firewall related topic.
- Week 8 (10/7): Read iptables tutorial
- Week 9 (10/18): Review for midterm
- Week 10 (10/26): Read
Snort IDS minimal installation guide, Browse NIST IDS Survey document
- Week 11 (11/2) Spring break
- Week 12 (11/9) ReadAnomalous Payload-based Worm Detection and Signature Generation, by Wang et al, Raid 2005.
- Week 13 (11/16) Read HIDS: Tripwire, Implementing Tripwire. Browse Tripwire presentation, Read Introduction to Nessus, scanning, analyze reports.
- Week 14 (11/23) Read CORE IMPACT - Penetration Testing: Assessing Your Overall Security Before Attackers Do by By Stephen Northcutt, Jerry Shenk,Dave Shackleford, Tim Rosenberg, Raul Siles, and Steve Mancini, browse ISSAF draft Sections 2, 3, 7.A, 7.B), CS591 viewgraphs.
- Week 15 (11/30) Read Security Models, Browse Bell-LaPadula model viewgraph, Chapter 3 Tour of Trusted Solaris Environment page 49 of trusted solaris user guide, SELinux