|
|
|||
Date |
Lecture
No. |
Slides |
Readings |
8/24/09 |
Lecture
1 |
"Computer
Security: Art and Science" (CS) Chapter 1 |
|
8/26/09 |
Lecture
2 |
CS
Chapter 4 (skip last section) |
|
8/28/09 |
Lecture
3 |
CS
Chapter 1 and risk analysis reading on compass. |
|
8/31/09 |
Lecture
4 |
Class
exercise: Risk analysis |
|
9/2/09 |
Lecture
5 |
CS
Chapter 9 section 1 through 2.2 |
|
9/4/09 |
Lecture
6 |
Enigma
movie. Link posted on class newsgroup. |
|
9/9/09 |
Lecture
7 |
CS
Chapter 9 section 2.3 and 2.4 |
|
9/11/09 |
Lecture
8 |
Review
symetric ciphers and address cipher techniques. |
CS
Chapter 11 section 1 and 2 |
9/14/09 |
Lecture
9 |
Class
exercise: A card-based stream cipher. Bring a deck of cards with two jokers.
I'll have a few extra decks but not enough for everyone. Exercise notes |
Schneier's description of the
Solitaire Encryption Algorithm |
9/16/09 |
Lecture
10 |
CS
Chapter 9 section 3 and 4 |
|
9/18/09 |
Lecture
11 |
Cover
Crypto Hash from Wednesday's slide set. |
CS
Chapter 9 |
9/21/09 |
Lecture
12 |
CS
Chapter 10 |
|
9/23/09 |
Lecture
13 |
Continue
on with key management. Possibly start Authentication. |
CS
Chapter 12 |
9/25/09 |
Lecture
14 |
Class
exercise: PKI and certificates PKI
scenario Certificates
|
|
9/28/09 |
Lecture
14 |
Authentication
Authentication (pdf) |
CS
Chapter 12 |
9/30/09 |
Lecture
15 |
Finish
up authentication. Access Control Matrix Access control matrix
(pdf) |
CS
Chapter 2 |
10/2/09 |
Lecture
17 |
Brief
presentation from Dr. Masooda Bashir on the ICSSP program. Finish access
control matrix. |
|
10/5/09 |
Lecture
18 |
Exam
review Exam review (pdf) |
Exam
ground rules:
|
10/07/09 |
Exam
1 |
Exam
1: Covering basic policy, risk analysis, applied cryptography, and general OS
security. |
Exam
given in class room at normal lecture time. You will be given 50 minutes to
complete the exam. |
10/9/09 |
Lecture
19 |
Discuss
exam results |
Exam 1 answers and comments Chapter 15 |
10/12/09 |
Lecture
20 |
Guest
Lecturer: Omid Fatemieh |
CS
Chapters 5 (5.1 and 5.2 up to the beginning of 5.2.3, and 5.3) and 30
(Lattices). |
10/14/09 |
Lecture
21 |
Guest
Lecturer: Fariba Khan |
CS
Chapter 6 |
10/17/08 |
Lecture
22 |
Database
security DB Security (pdf) |
Griffiths
and Wade, "An Authorization Mechanism for a Relational Database"
|
10/19/09 |
Lecture
23 |
System
Evaluation: Common Criteria System
evaluation (pdf) |
CS
Chapter 21 |
10/21/09 |
Lecture
24 |
Design
Principles and System Assurance Design principles (pdf) and System assurance
(pdf) |
CS
chapters 13 and 18 |
10/23/09 |
Lecture
25 |
Guest
Lecturer: Paul McNabb, Argus Systems |
|
10/26/09 |
Lecture
26 |
Designing
Secure Software Designing
secure software (pdf) |
CS
chapter 19 and Threat analysis reading posted to compass |
10/28/09 |
Lecture
27 |
CS
Chapter 22 |
|
10/30/08 |
Lecture
28 |
More
Malware |
|
11/2/09 |
Lecture
29 |
Still
more malware. |
|
11/4/09 |
Lecture
30 |
CS
Chapter 26 |
|
11/6/09 |
Lecture
31 |
More
Networking threats and networking review. |
CS
Chapter 26 |
11/9/09 |
Lecture
32 |
DNS
issues from previous lecture. Network
security controls and architecture (pdf) |
CS
Chapter 26 |
11/11/09 |
Lecture
33 |
More
Newtork security controls and architecture. |
|
11/13/09 |
Lecture
34 |
Spying
and the law reading on compass. CyberLaw I lesson
|
|
11/16/09 |
Lecture
35 |
||
11/18/09 |
Exam
2 |
Exam
2: Covering Databases, Trusted OS, Malware, Software assurance, network
security, security law. |
In
1310 DCL at normal class time |
11/20/09 |
Lecture
36 |
Return
and review exams |
Exam 2 answers and comments |
11/30/09 |
Lecture
37 |
IPSec and SSL (pdf) |
Later
part of CS Chapter 11 |
12/2/09 |
Lecture
38 |
Forensics
reading on compass |
|
12/4/09 |
Lecture
40 |
EMSEC |
|
12/7/09 |
Lecture
41 |
Wireless security (pdf) |
Unsafe at Any Key Size. Tech.
Rep. 00/362 Practical
Attacks Against WEP and WPA |
12/9/09 |
Lecture
42 |
Exam review (pdf) | |
12/16/09 12/18/09 |
I2CS
Final In-class
final |
Cumulative final at 8am. Last name A to O goto 1310 DCL. Last name P to Z goto 138 Henry Administration Building (HAB). |