Search for tag: "integrity"

ECS 235A, September 23, 2022

ECS-235A Lecture 2, September 23, 2022

+19 More
From  Matthew Bishop 0 likes 75 plays 0  

ECS 235B Winter Quarter 2022, Lecture 6

Lecture 6, on January 14, 2022 of ECS 235B, Foundations of Computer and Information Security

+19 More
From  Matthew Bishop 0 likes 21 plays 0  

ECS 235B Winter Quarter 2022, Lecture 5

Lecture 5, on January 12, 2022 of ECS 235B, Foundations of Computer and Information Security

+19 More
From  Matthew Bishop 0 likes 40 plays 0  

ECS 235A Fall Quarter 2021, Lecture 5, October 1, 2021

This is the video of the fifth lecture. It's crude as I made it from my laptop, as the room has no video recording. I suspect it's still very amateurish.

+19 More
From  Matthew Bishop 0 likes 20 plays 0  

ECS 235A Fall Quarter 2021, Lecture 2, September 24, 2021

This is the video of the second lecture. It's crude as I made it from my laptop, as the room has no video recording. This will be true for all the videos I post for this class.

+19 More
From  Matthew Bishop 0 likes 16 plays 0  

SITT 2021 -- Debbie Fetter

Dr. Fetter shares strategies for assessing students in very large enrollment nutrition classes while maintaining academic integrity (including tips for teaching online, hybrid, and face-to-face…

+20 More
From  Andy Jones 0 likes 74 plays 0  

ECS 153, Spring 2021; Lecture #18; May 7, 2021

ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.

+19 More
From  Matthew Bishop 0 likes 98 plays 0  

ECS 153, Spring 2021; Lecture #14; April 28, 2021

ECS 153 Spring 2021. Computer Security. This discusses buffer overflows, the Clark-Wilson model, and begins the discussion of trust. The video begins at 6:56 from the beginning.

+19 More
From  Matthew Bishop 0 likes 107 plays 0  

ECS 153, Spring 2021; Lecture #13; April 26, 2021

ECS 153 Spring 2021. Computer Security. This covers tranquility, integrity models, Biba, and begins the Clark-Wilson model. The video begins at 1:41 from the beginning.

+19 More
From  Matthew Bishop 0 likes 92 plays 0  

ECS 153, Spring 2021; Lecture #10; April 19, 2021

ECS 153 Spring 2021. Computer Security. This finishes the discussion of access control matrices and begins one on security policies. The video begins at 2:47 from the beginning.

From  Matthew Bishop 0 likes 68 plays 0  

ECS 235B, Winter 2021; Lecture #24; March 3, 2021

Foundations of Computer and Information Security. This covers integrity and information flow, some examples, and the confinement problem. The class starts at 3:15 into the video.

+19 More
From  Matthew Bishop 0 likes 17 plays 0  

ECS 235B, Winter 2021; Lecture #12; February 1, 2021

Foundations of Computer and Information Security. This covers trust models, introduces availability models, and presents constraint-based availability models. The class starts at 9:46 into the video.

+19 More
From  Matthew Bishop 0 likes 33 plays 0  

ECS 235B, Winter 2021; Lecture #11; January 29, 2021

Foundations of Computer and Information Security. This covers the Clark-Wilson model and trust models. The class starts at 2:28 into the video. The reference to power comes from parts of Davis…

+19 More
From  Matthew Bishop 0 likes 38 plays 0  

ECS 235B, Winter 2021; Lecture #10; January 27, 2021

Foundations of Computer and Information Security. This covers tranquility, System Z, the basics of integrity, and the Biba model. The class starts at 2:27 into the video.

+19 More
From  Matthew Bishop 0 likes 48 plays 0  

ECS 235B, Winter 2021; Lecture #5; January 13, 2021

Foundations of Computer and Information Security. This covers conspiracy in sharing in the Take-Grant Protection Model, security policies, policy models, and mechanisms. The class starts at 10:36…

+19 More
From  Matthew Bishop 0 likes 33 plays 0  

CEE Faculty Workshop - A cheatsheet to address Chegg: Dealing with it while promoting academic integrity

Cheating continues to challenge faculty and TAs in the transition to remote teaching. One increasingly common form of cheating is the mis-use of web-based “tutoring” and “homework…

+11 More
From  Kem Saichaie 1 likes 189 plays 0