Computer Security (CM2025)

Goldsmiths, University of London (GUL)

Here are the best resources to pass Computer Security (CM2025). Find Computer Security (CM2025) study guides, notes, assignments, and much more.

All 7 results

Sort by

Introduction to Operating System Security
  • Introduction to Operating System Security

  • Lecture notes • 11 pages • 2025
  • Available in package deal
  • Topic 3: Operating System Security Dive into the heart of the computer to understand how to secure the operating system itself. OS Security Principles: - Understand OS security as the process of ensuring OS integrity, confidentiality, and availability. - Learn about key security components, including the Kernel, Reference Monitor, and the Trusted Computing Base (TCB). - Define Hardening: the process of making an OS more secure by removing unnecessary features and applying security configu...
    (0)
  • £5.49
  • + learn more
An introduction to malware
  • An introduction to malware

  • Lecture notes • 9 pages • 2025
  • Available in package deal
  • Are you studying computer science or cybersecurity and looking for a complete, well-structured, and easy-to-follow resource? These in-depth notes cover three essential topics: Introduction to Computer Security and malware Packed with detailed explanations, real-world examples, and integrated quizzes with correct answers, this guide is everything you need to solidify your understanding and prepare for your exams. What's Inside? Topic 1: Introduction to Computer Security and Malware - Thi...
    (0)
  • £5.49
  • + learn more
RSA public key cryptography
  • RSA public key cryptography

  • Lecture notes • 8 pages • 2025
  • Available in package deal
  • This comprehensive guide is structured to build your knowledge step-by-step. 1. Introduction to RSA Public Key Cryptography Start with the core principles of asymmetric encryption and the geniuses behind the algorithm. - The RSA Algorithm: Named after its creators—Rivest, Shamir, and Adleman. - Public and Private Keys: Learn how RSA uses a public key (K) that is freely available and a private key (G) that is hidden. - One-Way Functions: Grasp the fundamental concept that makes RSA secur...
    (0)
  • £5.49
  • + learn more
Introduction of Cryptography
  • Introduction of Cryptography

  • Lecture notes • 12 pages • 2025
  • Available in package deal
  • This in-depth study guide on Understanding Cryptography is the perfect resource for any student of computer science, cybersecurity, or mathematics. From the simple ciphers of Julius Caesar to the advanced algorithms that protect our data today, these notes break down everything you need to know in an easy-to-understand format. Packed with historical context, detailed examples, and hands-on practice assignments, this guide will help you master the fundamentals and ace your exams.
    (0)
  • £5.49
  • + learn more
Introduction to Network Security
  • Introduction to Network Security

  • Lecture notes • 11 pages • 2025
  • Available in package deal
  • Topic 2: Network Security Build on the fundamentals by exploring how to protect networks from a wide array of attacks. Core Network Security: - Understand the main objectives of network security, revolving around Confidentiality, Integrity, and Availability. Denial of Service (DoS) Attacks: - Get a clear definition of a Denial of Service (DoS) attack, where legitimate users are prevented from accessing resources. - Learn how the attack surface extends across network layers, with exampl...
    (0)
  • £5.49
  • + learn more
Introduction to Hashing
  • Introduction to Hashing

  • Lecture notes • 8 pages • 2025
  • Available in package deal
  • This comprehensive study guide offers a complete breakdown of Hashing, starting with simple error-checking methods and progressing to the complex cryptographic functions that secure our digital world. The notes begin with the fundamentals, using parity checking as a basic example of error detection before defining a hash function as a computable function that maps an input of any size to a fixed-size output. A key concept explored is that of hash collisions and the famous "Birthday Problem,...
    (0)
  • £5.49
  • + learn more