Description
This course covers the fundamentals of cyber defence, beginning with foundational models like the Bell-LaPadula and information flow frameworks. These underlying policy enforcement mechanisms aid in the introduction of basic functional safeguards, beginning with authentication methods. In the context of a canonical schema, students will be introduced to a variety of authentication solutions and protocols, including RSA SecureID and Kerberos.
Syllabus :
1. Cyber Security Safeguards
- Introduction: What You Will Learn from This Course on Cyber Security
- Assignments and Reading
- Safeguards and Countermeasures
- Reference Model
- Orange Book Compliance
- Bell La Padula Model
- Biba Integrity Model
- Issues with Subject-Object-Actions Models
- Covert Channels
- Information Flow Models and Hook-Up Theorem
- Welcome Kirsten Bay
2. Understanding Authentication Protocols
- Identification and Authentication
- Factors of Authentication including 2FA
- Authentication Protocol Schema and Zones
- Passwords and Analysis
- Hand-Held Authentication Protocol (Implementation)
- Hand-Held Authentication Protocol (Analysis and Cryptanalysis)
- Welcome Lior Frenkel
- RSA SecureID Protocol (Implementation)
- RSA SecureID Protocol (Analysis)
3. Introducing Conventional Cryptography
- Lamport’s S/Key Protocol (Implementation)
- Lamport’s S/Key Protocol (Analysis)
- Welcome Ajoy Kumar
- Kerberos (TGT Issuance)
- Kerberos (TBOB Issuance)
- Basic Cryptosystems and Properties
- Cryptographic Algorithm Design
- DES Design
- Triple-DES
4. Overview of Public Key Cryptographic Methods
- CBC Mode Block Cryptography
- Conventional Cryptography Scaling Issues
- Public Key Crypto (Basics)
- Public Key – Secrecy
- Public Key – Digital Signature
- Cryptographic Message Exchange
- Diffie-Hellman Key Exchange
- Key Distribution and Certification Authority
- Secure Sockets Layer
- The Story of James Ellis and Clifford Cox
- Welcome Franscis Cianfrocca