Filter By
Filter Reset
Lectures
  • All Lectures
  • Lecture 1 (1)
  • Lecture 2 (1)
  • Lecture 3 (1)
  • Lecture 4 (1)
  • Lecture 5 (1)
  • Lecture 6 (1)
  • Lecture 8 (1)
  • Lecture 9 (1)
  • Lecture 10 (1)
  • Lecture 11 (1)
  • Lecture 12 (1)
  • Lecture 13 (1)
Semester
Class Notes (1,045,526)
AUS (35,230)
QUT (1,777)
CAB (12)
CAB240 (12)

Class Notes for CAB240 at Queensland University of Technology

Information Security

CAB240 Lecture Notes - Lecture 13: Information Security Management, Information Security, Denial-Of-Service Attack
Premium

Week 13: Review Monday, 29 October 2018 10:13 AM Unit Aims On completing this unit, you should: Be able to: o Understand the fundamental concepts and major issues in information security, o Identify critical information se...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 3: Information Security, Expected Loss, Systems Analysis
Premium

Week 3: Information Security Risk Management Why manage information security? The use of mobile devices, email, external services, portable storage etc. brings about the necessity of managing information assets...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 9: Ciphertext, Plaintext, Discrete Logarithm
Premium

Week 9: Asymmetric Cryptography Comes from the Diffie Hellman key establishment, sort of the new type of maths that uses public components without compromising security goals. Keys are different, one key ...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 8: Disk Encryption, Plaintext, Ciphertext
Premium

What is cryptography? Cryptography is part of the field of study known as cryptology, which includes both: Cryptography - studying methods for 'secret writing' using some secret knowledge Cryptoanalysis - analys...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 10: Public-Key Cryptography, Symmetric-Key Algorithm, Key Distribution
Premium

Week 10: Public Key Infrastructure Why use public key cryptography? Key Establishment Problem Symmetric cipher uses the same key to encrypt and decrypt, leaving the problem of safely and securely distributing ...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 11: Osi Model, Network Interface Controller, Internet Protocol Suite
Premium

Basic Network Concepts Network A number of computers and devices, connected by communications channels, hardware, and software to enable data exchange The devices can be computers, printers, scanners, ser...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 4: Access Control, Authenticator, Feature Extraction
Premium

Week 4: Identity & User Authentication What is user authentication? Process used to decide whether the identity a user claims is genuine (authentic) or not. Important if decisions are based on user identity. ...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 1: Information Security, Web Browsing History, Critical Infrastructure
Premium

Week 1: Introduction Is information security important? Why? Personal information: o Who are you o What do you do for a living o Why are you in this course o Where do you live o When were you born o How do you get around W...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 6: Data Mining, Data Breach, De-Identification
Premium

Week 6: Privacy What is privacy? The interest that individuals have in sustaining a personal space, free from interference by other people and organisations Meaning depends on the context - Clarkes dimensions of privacy: o...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 2: Information Security, Lost And Found, Physical Security
Premium

Week 2: Threats, Vulnerabilities Attacks Introduction Information is an important asset for individuals and organisations Information security is about protecting information assets from damage or harm. For particular ass...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 5: Application Software, Mandatory Access Control, Discretionary Access Control
Premium

Week 5: Access Control What is access control? Controlling or restricting the user of information assets and/or resources to: o Allow authorised users access to information resources they need to perform th...

Computer Science
CAB240
Leonie Simpson
CAB240 Lecture Notes - Lecture 12: Ingress Filtering, Egress Filtering, Network Layer
Premium

Week 12: Network Security II Monday, 15 October 2018 12:39 PM Firewalls A firewall is a component or set of components placed at an interface between two networks with differing security requirements. The aim is to control...

Computer Science
CAB240
Leonie Simpson

Log In


OR

Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit