Aar}  @ U` `00 Pp  P@@0HH $ @d HHHH̀̀̀ff@  d Footnote TableFootnote**.\t.\t/ - :;,.!? : aN:8csTOCHeading1Heading2   WEquationVariablesL6D6 <$lastpagenum><$monthname> <$daynum>, <$year>"<$monthnum>/<$daynum>/<$shortyear>;<$monthname> <$daynum>, <$year> <$hour>:<$minute00> <$ampm>"<$monthnum>/<$daynum>/<$shortyear><$monthname> <$daynum>, <$year>"<$monthnum>/<$daynum>/<$shortyear> <$fullfilename> <$filename> <$paratext[Title]> <$paratext[Heading1]> <$curpagenum> <$marker1> <$marker2> (Continued)+ (Sheet <$tblsheetnum> of <$tblsheetcount>)Heading & Page <$paratext> on page<$pagenum>Pagepage<$pagenum>See Heading & Page%See <$paratext> on page<$pagenum>. Table All7Table<$paranumonly>, <$paratext>, on page<$pagenum>Table Number & Page'Table<$paranumonly> on page<$pagenum>AA?A,5y'5|'5555Dj8J&J&J&J&J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5J5KJJ5J5J5J5J5J5J5J5J5J5J5L5Le5J5J5J5J5J5J5J5J5J5K5K5K5K5K 5K 5K 5K5K5K5K5K5K5K5K5K5K!5K#5K%5K'5K)5K+5Lu5K.K05K25K45K65K85K:5K<5K>5K@5KB5KD5KF5KH5KJ5KL5KN5KP5KR5KT5KV5KX5KZ5K\5K^5K`5Kb5Kd5Kf5Kh5Kj5Kl5Kn5Kp5Kr5Kt5Kv5Kx5Kz5K|5K~5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5L'K5K5K5K5K5K5K5K5K5K5K5K5K5K5Qdqdqdq HmRqHmRHRHR2Footnote Hr@qHr@HzHz2 Single LineHqFootnote 5_  HDq HDHH2 Double LineHq Double Line5c 5e Hq  Single Line5h HZq  TableFootnote EGxRqEGxREPwEPw2 TableFootnoted5p HHˆ5xHHˆGe HHˆ5zHHˆl HHˆ5{HHˆW` HHˆ5}HHˆl HUV 5~HUV W` HUV 5HUV l H$ 5H$ Wh:October 1, 1999 ECS 153 Fall 1999  W1 U H$ 5H$ l HUV 5HUV Ge HUV 5HUV l H$ 5H$ Ge H$ 5H$ l HHˆ5HHˆ™  "&*.26:>BFJNW @hSyllabus  V HHˆ5HHˆ?l}HfJ HfW!`# }afDJ!afDW !`date }fJ "fW !`topic }f|J!#f|W !`notes }H}J"$H}W a1. }a}DJ#%a}DW a Fri, Oct 1 }}J$&}Wa(Introduction: what is computer security }}|J%'}|W` }HJ&(HW`2. }aDJ')aDW` }J(*W`=Discussion : Trust, risk analysis, non-technical threats }|J)+|W` }HJ*,HW` }aDJ+-aDW` Mon, Oct 4 }J,.W`&no class  (SANS Network Security) }|J-/|W` }HJ.0HW`3. }aDJ/1aDW` Wed, Oct 6 }J02W`&Robust programming rules and examples }|J13|W` }HJ24HW`4. }aDJ35aDW` Fri, Oct 8 }J46W`8Robust programming rules and examples ( cont ) }|J57|W` }HJ68HW ` }aDJ79aDW!` }J8:W"`$Discussion : Social engineering }|J9;|W#` }HJ:<HW$`5. }aDJ;@aDW%` Mon, Oct 11 d5?? HHˆ5=HHˆ Q?"&*.26:>BFJN*~ Please note that this syllabus is  tentative  and subject to change. If you want to hear about a topic not listed above, or P@>l}J`10. }amDJVXamDW?` Fri, Oct 22 }mJWYmW@`)Access control matrix; security policies }m|JXZm|WA` }HJY[HWB` }aDJZ\aDWC` }J[]WD`&Discussion : Policies at UC Davis }|J\^|WE` }HJ]_HWF`11. }aDK^`aDWG` Mon, Oct 25 }K_aWH`$Security policies ( cont ) }|K`b|WI!`homework #2 due }HKacHWJ`12. }aDKbdaDWK` Wed, Oct 28 }K ceWL`7Authentication: passwords,  crypt (3), attacks }|K df|WM` }HKegHWN`13. }aDKfhaDWO` Fri, Oct 29 }KgiWP`Users, groups, roles }|Khj|WQ!`project part 2 due }HKikHWR` }aDKjlaDWS` }KkmWT`$Discussion : Review for midterm }|Kln|WU` }HKmoHWV`13. }aDK npaDWW` Mon, Nov 1 }K"oqWX`midterm }|K$pr|WY` }HK&qsHWZ`14. }aDK(rtaDW[` Wed, Nov 3 }K*suW\`3Access control lists, capabilities, locks and keys }|K-tv|^ last day to change to P/NP P@or S/U grading }HK/uwHW_`15. }aDK1vxaDW`` Fri, Nov 5 }K3wyWa`Access rings, PACLs }|K5xz|Wb` }H-K7y{H-Wc` }a-DK9z|a-DWd` }-K;{}-We`+Discussion : Go through midterm; S/Key }-|K=|~-|Wf` }HAK?}HAWg`16. }aADKA~aADWh` Mon, Nov 8 }AKCAWi`/Malicious logic: Trojan horses, viruses, worms }A|KEA|Wj!`homework #3 due }HUKGHUWk`17. }aUDKIaUDWl` Wed, Nov 10 }UKKUWm`:Defending against malicious logic; property-based testing }U|KMU|Wn` }HiKOHiWo`18. }aiDKQaiDWp` Fri, Nov. 12 }iKS iWq`Auditing and logging }i|KU i|Wr` }H}KW H}Ws` }a}DKY a}DWt` }}K[ }Wu`?Discussion : Examples of famous malicious logic; isolation }}|K] }|Wv` }H_K_=H_>Ww`19. }a_DKa=a_D>Wx` Mon, Nov. 15 }_Kc=_>Wy`Wz` }HsKg=Hs>W{`20. }asDKi=asD>W|` Wed, Nov. 17 }sKk=s>W}`)Network security; cryptography as a tool }s|Km=s|>W~` }HKo=H>W`21. }aDKq=aD>W` Fri, Nov. 19 }Ks=>W`Analyzing network protocols }|Ku=|>W` }HKw=H>W` }aDKy=aD>W` }K{=>W`8Discussion : Cryptographic protocols; X.509 failure }|K}=|>W` }HK=H> W`22. }aDK= aD> W` Mon, Nov 22 }K=!> W `#Security in network administration }|K= "|> W !`homework #4 due }HK=!#H>!W `23. }aDK="$aD>!W ` Wed, Nov 24 }K=#%>!W `"Security in system administration }|K=$&|>!W` }HK=%'H>"W` }aDK=&(aD>"W` Fri, Nov 26 }K=')>"W`no class  (Thanksgiving) }|K=(*|>"W` }HK=)+H>#W` }aDK=*,aD>#W` }K=+->#W`4Discussion :  none  (Thanksgiving)  }|K=,.|>#W` }HK=-/H>$W`24. }aDK=.0aD>$W` Mon, Nov 29 }K=/1>$W`Security in system use }|K=02|>$W` }HK=13H>%W`25. }aDK=24aD>%W` Wed, Dec 1 }K=35>%W`/Security in programming; principles and design }|K=46|>%W` }H'K=57H'>&W`26. }a'DK=68a'D>&W ` Fri, Dec 3 }'K=79'>&W!`-Security in programming: UNIX implementation }'|K=8:'|>&W"!` }H;K=9;H;>'W#` }a;DK=:<a;D>'W$` };K=;=;>'W%`%Discussion : UNIX security tools };|K=<>;|>'W&` }HOK==?HO>(W'`27. }aODK=>@aOD>(W(` Mon, Dec 6 }OK=?AO>(W)`Denial of service }O|K=@BO|>(W)W+`28. }acDK=BDacD>)W,` Wed, Dec 8 }cK=CEc>)W=`&Computability; HRU result, Take-Grant }c|K=DFc|>)W.` }HwK=EGHw>*W/`29. }awDK=FHawD>*W0` Fri, Dec 10 }wK=GIw>*W1`to be determined }w|K=HJw|>*W]!`project part3 due }HK=IKH>+W3` }aDK=JLaD>+W4` }K=KM>+W5`"Discussion : Review for final }|K=LN|>+W6` }HK=MOH>,W7` }aDK=NPaD>,W8` Tue, Dec 14 }K=OQ>,W9` final exam }|K=P|>,W:` dLeftdRightd Referencedd=f@ XCellBody. f@ X Footnote.  f@T XHeading2Body. f@T X HeadingRunInBody. f@ X Indented. f@ X TableFootnote. f@T X TableTitleT:Table : . @@ XHeader Double Line. f@T X$ TableTitleT:Table : . f@ X CellFooting. @@ XFooter. f@ XRule. @@ X $ H l      D h  ManHeading.  f@ X CellHeading. f@ XBody.  f@P X Heading InfoBody. f@ XBody. f@ X CellHeading. f@E X Numbered1.\tNumbered. f@ X Numbered.\t. f@ X Bulleted\t. f@ XCellBody. f@ XCellBody.  f@PXTitleBody.  f@PXTitleBody.  @@ X ManHeading2.  f@T XHeading1Body. @@ X $ H l      D h  ManBody. XEmphasisXEquationVariables X X X X 33XX X X XX X X X 1ThinMediumDoubleThick@ Very Thinxxxxx8 H&5H&5H&5H&5H&5Format A H&5H&5H&5H&5H&5Format B H&5H&5H&5H&5H&5Format Ag,D|,Hf !"H}#$%&H ' ( ) *H+,-.H/012H3456H 7 8 9 :H ;<@AH  B C D E H F G H I H1 J K L M HE  N  O  P  Q HY R S T U Hm VWXYHZ[\]H ^ _ ` aHbcdeHfghiHjklmH n o p qHrstuHvwxyH-z{|}HA ~   HUHi H}    H_>    Hs>H>H >H!>      ! H ">"!#!$!%!H!#>&"'"(")"H"$>*#+#,#-#H#%> .$ /$ 0$ 1$H$&>2%3%4%5%H'%'>6&7&8&9&H;&(>:';'<'='HO')> >( ?( @( A(Hc(*>B)C)D)E)Hw)+>F*G*H*I*H*,>J+K+L+M+H+>N,O,P,Q,Comment6d BlackT!WhiteddARedddGreendd BluedCyandMagentad YellowHeader/Footer $1Header/Footer $1Header/Footer $2Header/Footer $2IndexIndexCommentCommentSubjectSubjectAuthorAuthorGlossaryGlossaryEquationEquation Hypertext Hypertext  Cross-Ref Cross-Ref Conditional TextConditional TextPositionFMPrivatePositionFMPrivateRangeEndFMPrivateRangeEndFMPrivate HTML Macro HTML Macro M.Times.BITimes-BoldItalic FrameRoman M.Times.P Times-Roman FrameRoman M.Times.B Times-Bold FrameRoman M.Times.I Times-Italic FrameRoman M.Helvetica.BHelvetica-Bold FrameRomanf0 HelveticaWTimes"Regular$RomanBoldRegularItalicYk[,`lbyZ@14aX|Yoz2tftqbFu&xVVY#0^bm^ < 4CrZ32a