Intro

Objectives

  1. Understand how a firewall works.
  2. Explain symmetric and asymmetric encryption and key exchange.
  3. Explain how digital signatures and certificates are obtained and used.
  4. Discuss worms, Trojans and viruses and the vulnerabilities that they exploit.
  5. Discuss how improved code quality, monitoring and protection can be used against such threats.

Resources

Slides

The SSL/TLS handshake process

Worksheet

Homework