|
ECS-235A Lecture 2, September 23, 2022
|
|
Lecture 6, on January 14, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
Lecture 5, on January 12, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
This is the video of the fifth lecture. It's crude as I made it from my laptop, as the room has no video recording. I suspect it's still very amateurish.
|
|
This is the video of the second lecture. It's crude as I made it from my laptop, as the room has no video recording. This will be true for all the videos I post for this class.
|
|
Dr. Fetter shares strategies for assessing students in very large enrollment nutrition classes while maintaining academic integrity (including tips for teaching online, hybrid, and face-to-face…
|
|
ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.
|
|
ECS 153 Spring 2021. Computer Security. This discusses buffer overflows, the Clark-Wilson model, and begins the discussion of trust. The video begins at 6:56 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers tranquility, integrity models, Biba, and begins the Clark-Wilson model. The video begins at 1:41 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This finishes the discussion of access control matrices and begins one on security policies. The video begins at 2:47 from the beginning.
|
|
Foundations of Computer and Information Security. This covers integrity and information flow, some examples, and the confinement problem. The class starts at 3:15 into the video.
|
|
Foundations of Computer and Information Security. This covers trust models, introduces availability models, and presents constraint-based availability models. The class starts at 9:46 into the video.
|
|
Foundations of Computer and Information Security. This covers the Clark-Wilson model and trust models. The class starts at 2:28 into the video. The reference to power comes from parts of Davis…
|
|
Foundations of Computer and Information Security. This covers tranquility, System Z, the basics of integrity, and the Biba model. The class starts at 2:27 into the video.
|
|
Foundations of Computer and Information Security. This covers conspiracy in sharing in the Take-Grant Protection Model, security policies, policy models, and mechanisms. The class starts at 10:36…
|
|
Cheating continues to challenge faculty and TAs in the transition to remote teaching. One increasingly common form of cheating is the mis-use of web-based “tutoring” and “homework…
|