I don't want to reset my password
CSCI 4531 Computer Security is a Computer science course at GWU taught by the following professor: Mohamed Refaei. 3 elite notetakers have produced 4 study materials for this Computer science course.
In this lecture, we discuss the basics of computer security such as what constitutes a threat, how far we have come dealing with them, how to categorize them, and other things that contribute to the overall idea of keeping computers secure.
We discussed the basics of encryption, the two kinds of it, the components of encryption, the different kinds of attacks on them, and the different ciphers.
We finish chapter 2 about symmetric encryption and asymmetric encryption algorithms. There are diagrams available on lecture slides. Then we began an overview on random and pseudorandom numbers, cryptography, and ciphers.
In this class, we finished the discussion of symmetric encryption and message confidentiality.
We take a look at other encryption algorithms, specifically SHA and its different versions, the RSA algorithm, Diffie-Hellman, and HMAC, and the level of security each provides.
We begin our discussion around the authentication process, and how users are granted access to certain domains, or systems. Typically, there is a process of password checking with a given username and assuring the person is authorized to enter wherever they are trying to log into.
There are numerous security measures seen in society today, such as cat cards, smart cards, and biometric security systems, that all offer new advanced methods of protecting information. They all have grown from foundations established in the past.
This is a comprehensive study guide with all of the notes and diagrams from the course. The midterm will be based on the lecture slides and notes are allowed in the exam (no laptops or textbooks).
We continue the discussion on access control and how different users are given access to certain files, objects, etc. based on their authorized access given.
We conclude our chapter of access control and begin to discuss malware, one of the many malicious software threats in the world today.
We complete our discussion on the various kinds of malicious software out there in the world today, and how it can affect our lives. Then, we begin to discuss the different authentication processes conducted to confirm who we are online.
As the semester is coming to a close, we are beginning to round out of the discussion of authentication and how certain users are given rights to see, edit, or add to certain documents, while others are not. In addition, we begin the topic of the different, trusted security algorithms and systems used in the government and society today.
This study guide includes all notes and diagrams from after the midterm to the final class. The exam is not cumulative.