| Number
of votes |
n/a |
0 |
1 |
2 |
3 |
4 |
|---|---|---|---|---|---|---|
| Introduction/overview: threats, risk, vulnerabilities and impact | 0 |
0 |
0 |
5 |
7 |
10 |
| Symmetric key encryption | 0 |
0 |
0 |
3 |
9 |
10 |
| Secure one-way hash functions | 0 |
0 |
0 |
5 |
14 |
3 |
| Public key encryption | 0 |
0 |
0 |
2 |
8 |
12 |
| Secure protocols | 0 |
0 |
0 |
4 |
8 |
10 |
| Key certificates and PGP | 1 |
0 |
0 |
7 |
7 |
7 |
| Trusted Computing and NGSCB |
0 |
0 |
0 |
12 |
4 |
6 |
| Percentages |
- |
0 |
1 |
2 |
3 |
4 |
|---|---|---|---|---|---|---|
| Introduction/overview: threats, risk, vulnerabilities and impact | - |
0 |
0 |
23 |
32 |
45 |
| Symmetric key encryption | - |
0 |
0 |
14 |
41 |
45 |
| Secure one-way hash functions | - |
0 |
0 |
23 |
64 |
13 |
| Public key encryption | - |
0 |
0 |
9 |
36 |
55 |
| Secure protocols | - |
0 |
0 |
18 |
36 |
46 |
| Key certificates and PGP | - |
0 |
0 |
33 |
33 | 33 |
| Trusted Computing and NGSCB |
- |
0 |
0 |
55 |
18 |
27 |
| Number
of votes |
n/a | 0 |
1 |
2 |
3 |
4 |
| Effective Security (Harj Singh) |
2 |
0 |
1 |
5 |
6 |
8 |
| Fair exchange protocols (Steve Kremer) |
1 |
0 |
4 |
6 |
8 |
3 |
| Percentages |
n/a |
0 |
1 |
2 |
3 |
4 |
|---|---|---|---|---|---|---|
| Effective Security (Harj Singh) |
- |
0 |
5 |
25 |
30 |
40 |
| Fair exchange protocols (Steve Kremer) |
- |
0 |
19 |
29 |
38 |
14 |
| Number of votes | n/a | 0 |
1 |
2 |
3 |
4 |
| Spyware and Trojan horses |
0 |
0 |
4 |
6 |
8 |
4 |
| Zero knowledge protocols |
0 |
1 |
2 |
9 |
7 |
4 |
| Biometric authentication |
1 |
0 |
0 |
10 |
9 |
2 |
| Digital cash |
0 |
0 |
5 |
9 |
7 |
1 |
| Steganography and digital watermarking |
0 |
0 |
0 |
5 |
12 |
5 |
| Language security and buffer overflows |
0 |
0 |
1 |
8 |
10 |
3 |
| Wifi and bluetooth security |
0 |
0 |
1 |
11 | 8 |
2 |
| SSL and attacks |
0 |
0 |
2 |
12 |
7 |
1 |
| Denial of service attacks |
0 |
0 |
0 |
12 |
7 |
3 |
| Percentages | - |
0 |
1 |
2 |
3 |
4 |
| Spyware and Trojan horses |
- |
0 |
18 |
27 |
37 |
18 |
| Zero knowledge protocols |
- |
5 |
14 |
41 |
32 |
18 |
| Biometric authentication |
- |
0 |
0 |
48 |
43 |
9 |
| Digital cash |
- |
0 |
23 |
41 |
32 |
4 |
| Steganography and digital watermarking |
- |
0 |
0 |
23 |
54 |
23 |
| Language security and buffer overflows |
- |
0 |
5 |
36 |
45 |
14 |
| Wifi and bluetooth security |
- |
0 |
5 |
50 |
36 |
9 |
| SSL and attacks |
- |
0 |
9 |
55 |
31 |
5 |
| Denial of service attacks |
- |
0 |
0 |
55 |
31 |
14 |
| Viruses and worms | 12 |
| Firewalls | 12 |
| Security of Open-Source Software | 6 |
| P2P security | 6 |
| Differential cryptanalysis | 5 |
| Vulnerabilities on routers, switches, other hardware | 5 |
| Holes in popular software | 5 |
| Random number generation | 4 |
| IPSec | 4 |
| Intrusion detection systems | 4 |
| Government control of crypto; the Clipper Chip | 4 |
| Electronic voting | 3 |
| Microsoft passport and other single-signon systems | 3 |
| Human factors | 2 |
| Kerberos | 2 |
| CSS and DeCSS | 1 |
| NESSUS | 1 |
| Cryptanalysis |
| More
classical (symmetric) cryptography |
| Unbreakable
crypto (one-time pads) |
|
Secure subnet topologies |
| Domain
separation |
| Programming
secure distributed systems (Java) |
| RMI |
| Number of votes |
n/a | I
have enough |
I
would have liked more mathematics to help me understand the lectures |
I would have liked the module to have less mathematics |
|---|---|---|---|---|
| Mathematical background |
1 |
17 |
4 |
0 |
| Percentages |
- |
I
have enough |
I
would have liked more mathematics to help me understand the lectures |
I would have liked the module to have less mathematics |
|---|---|---|---|---|
| Mathematical
background |
- |
81 | 19 |
0 |
| Number
of votes |
n/a | 0 |
1 |
2 |
3 |
4 |
| Lectures
given by Mark Ryan |
0 |
0 |
3 |
17 |
2 |
0 |
| Seminars
given by students |
0 |
0 |
8 |
11 |
3 |
0 |
| Percentages |
- |
0 |
1 |
2 |
3 |
4 |
| Lectures
given by Mark Ryan |
- |
0 |
14 |
77 |
9 |
0 |
| Seminars
given by students |
- |
0 |
36 |
50 |
14 |
0 |
| Number
of votes |
n/a | 0 |
1 |
2 |
3 |
4 |
| Lectures
given by Mark Ryan |
0 |
0 |
11 |
11 |
0 |
0 |
| Seminars
given by students |
0 |
0 |
5 |
14 |
3 |
0 |
| Percentages |
- |
0 |
1 |
2 |
3 |
4 |
| Lectures
given by Mark Ryan |
- |
0 |
50 |
50 |
0 |
0 |
| Seminars
given by students |
- |
0 |
23 |
64 |
13 |
0 |
| Number of votes | n/a | 0 |
1 |
2 |
3 |
4 |
| Liked
giving seminars |
0 |
0 |
4 |
3 |
9 |
6 |
| Liked
attending other students' seminars |
0 |
0 |
2 |
9 |
8 |
3 |
| Percentages | - |
0 |
1 |
2 |
3 |
4 |
| Liked
giving seminars |
- |
0 |
18 |
14 |
41 |
27 |
| Liked
attending other students' seminars |
- |
0 |
9 |
41 |
36 |
14 |