Filter By
Filter Reset
Lectures
  • All Lectures
  • Lecture 1 (1)
  • Lecture 2 (1)
  • Lecture 3 (1)
  • Lecture 4 (1)
  • Lecture 5 (1)
  • Lecture 6 (1)
  • Lecture 7 (1)
  • Lecture 8 (1)
  • Lecture 9 (1)
Semester
Class Notes (1,046,623)
AUS (35,312)
Monash (3,704)
FIT (395)
FIT2093 (9)

Class Notes for FIT2093 at Monash University

Introduction to cyber security

FIT2093 Lecture Notes - Lecture 4: Block Cipher, Substitution Cipher, Modulo Operation
Premium

FIT2093 W4 Notes What we have seen so far: 2 levels of defence Authentication to gain access to the system Access Control (DAC by operating system and MAC by the organisation) to have rightful operation on the information...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 2: Discretionary Access Control, Retina
Premium

Lecture 2 - Authentication User Authentication: the process of verifying an identity claimed by or for a system entity - Fundamental security building block and the basis of access control & user accountability - 2 Steps: ...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 8: Public Key Infrastructure, Ciphertext, Digital Signature
Premium

FIT2093 W89 Notes 1. What are the essential ingredients of an asymmetric cipher? Plaintext: original message or data Encryption algorithm: the performs substitutions and transformations of the plaintext Public key Sec...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 9: Public-Key Cryptography, Message Authentication Code, Hash Function
Premium

Week 10 Notes 1. Briey describe two main use of digital signature Validate the authenticity and integrity of a message, software or digital documents Nonrepudiation Verify source or issuer Detect forgery or tampering 2...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 5: Substitution Cipher, Ciphertext, Plaintext

Lecture 4 Fundamental Concepts of Cryptography Cryptography: study of message secrecy Aim of cryptography is to generate efficiently the cipher text from plain text and viceversa if you know the secret scrambling informat...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 3: Mandatory Access Control, Discretionary Access Control, Job

Lecture 3 Access Control and Security Models Access Control: the prevention of unauthorised use of a resource, including the prevention of use of a resource in an unauthorised manner Central element of computer security ...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 7: Public Key Infrastructure, Ciphertext, Plaintext

Lecture 7 Public Key Cryptography Private (Symmetric) Key Cipher Attack: Cryptanalysis: Relies on nature of the algorithm Plus some knowledge of plaintext characteristics Even some sample plaintext characteristics Ev...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 6: Coprime Integers, Prime Number, Composite Number

Lecture 5 Symmetric Encryption techniques Symmetric Key Cryptography A symmetric key cipher is composed of 2 algorithms: Encryption Algorithm E Decryption Algorithm D The same key K is used for encryption decryption ...

Information Technology
FIT2093
Dr Ron Steinfeld
FIT2093 Lecture Notes - Lecture 1: Telephone Tapping, Email Spam, Information Security

FIT2093 - Revision Notes Lecture 1 - Introduction to Cyber Security Computer Security: The protection afforded to an automated information system in order to attain the applicable objectives of preservin...

Information Technology
FIT2093
Dr Ron Steinfeld

Log In


OR

Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit