Sept 8 |
|
|
|
|
Sept 10 |
|
|
|
|
Sept 15 |
Cryptography |
PUIS Chapter 7 - Cryptography Basics |
|
Security
Engineering - Chapter 5 - Cryptography |
Sept 17 |
|
|
|
|
Sept 22 |
|
|
|
|
Sept 24 |
Secure Design Principles |
|
The
Protection of Information in Computer Systems, up to part B. |
Engineering Principles for Information
Technology SecurityManaging and Understanding Entropy Usage |
Sept 29 |
Passwords |
Security
Engineering, Chapter 2 Section 4PUIS pages 67-90 |
Enough With the Rainbow Tables: What You Need
to Know About Secure Password Schemes
Enough With the Salts: Updates on Secure Password Schemes
|
Once seen as bulletproof, 11 million+ Ashley
Madison passwords already cracked
Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick |
Oct 1 |
Authentication |
Security Engineering Chapter 15 |
|
|
Oct 6 |
|
|
|
|
Oct 8 |
|
|
|
|
Oct 13 |
|
|
|
|
Oct 15 |
|
|
|
RFID Hacking |
Oct 20 |
|
|
|
|
Oct 22 |
Software Security |
|
Smashing the Stack for Fun and Profit |
X-Ray Scans Expose an Ingenious Chip-and-Pin Card Hack |
Oct 29 |
|
|
|
|
Nov 3 |
|
|
Format String Attacks |
|
Nov 5 |
|
|
|
Article about Java Vulnerability |
Nov 10 |
Hardware Security |
Security
Engineering, Chapter 16 Security
Engineering, Chapter 17 |
|
Intel
x86 Considered Harmful
Revisiting the Black Sunday Hack
From the Eye of a Legal Storm, Murdoch’s Satellite-TV Hacker Tells All |
Nov 12 |
|
|
|
|
Nov 17 |
Hardware Security and Trusted Systems |
PUIS Chapter 26 - Who do you trust? |
Reflection on Trusting Trust |
Trusted Computer System Evaluation Criteria |
Nov 19 |
Malware |
|
|
|
Nov 24 |
|
|
How to 0wn the Internet in Your Spare Time |
To Kill a Centrifuge
Stuxnet Under the Microscope
|
Dec 1 |
Penetration Testing / Backups |
PUIS Chapter 18 - Backups |
Data Backup Options |
|
Dec 3 |
Personnel Security |
PUIS Chapter 9 - Personnel Security
PUIS Chapter 18 - Backups |
Employment Background Checks:
A Jobseeker's Guide |
|
Dec 8 |
Physical Security |
Security
Engineering - Chapter 11
PUIS
Chapter 8 - Physical Security for Servers
|
|
|