|
ECS-235A, Lecture 18, October 31, 2022
|
|
ECS-235A, Lecture 17, October 28, 2022
|
|
ECS-235A, Lecture 16, October 26, 2022
|
|
ECS-235A, Lecture 15, October 24, 2022
|
|
Lecture January 31, 2022 of ECS 289M, Research in Computer Security
|
|
This is the video of the seventeenth lecture. It's crude as I made it from my laptop, as the room has no video recording. Interesting angle there . . .
|
|
This is the video of the sixteenth lecture. It's crude as I made it from my laptop, as the room has no video recording. Hope this is clear!
|
|
ECS 153 Spring 2021. Computer Security. This discusses trust, the Chinese Wall model, ORCON, and begins RBAC. The video begins at 6:03 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of April 12. The video begins at 8:08 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This presents several vulnerability databases and attack trees. The video begins at 8:15 from the beginning.
|
|
Module 3 - comprehensive vs. bounded rationality
|
|
ECS 153 Spring 2021. Computer Security. This continues the discussion of the models. The video begins at 7:48 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers the rest of penetration testing and begins vulnerability models. The video begins at 5:05 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This discusses penetration (red team) testing. The video begins at 9:18 from the beginning.
|
|
ECS 153, Computer Security. This presents the basics of an SQL injection attack (as one was discovered on campus), finishes the robust programming material, and begins discussing vulnerabilities…
|
|
|