Actual Syllabus

# date topic reading1 and notes
1. Fri, Sep 26 Introduction; what is computer security §1
2. Mon, Sep 29 Principles of secure design §13
3. Wed, Oct 1 Robust programming handout
  Wed, Oct 1 Discussion: class project, robust programming  
4. Fri, Oct 3 Access control matrix, HRU result §2, 3.1-3.2
5. Mon, Oct 6 Security policies §4.1-4.4, 4.6
6. Wed, Oct 8 Confidentiality models: Bell-LaPadula Model (Walcott) §5.1,5.2.1-5.2.2
  Wed, Oct 8 Discussion: Attack analysis (Walcott) §30
7. Fri, Oct 10 Distributed denial of service (Prof. Wu) §
8. Mon, Oct 13 Integrity models: Biba strict integrity, Clark-Wilson §6.1,6.2.3,6.4
9. Wed, Oct 15 Basic cryptography: classical §9.1-9.2
  Wed, Oct 15 Discussion: modular arithmetic, Euclidean algorithm §31
10. Fri, Oct 17 Basic cryptography: public key §9.3
11. Mon, Oct 20 Basic cryptography: cryptographic hashes §9.4
12. Wed, Oct 22 Key distribution §10.1-10.2
  Wed, Oct 22 Discussion: Entropy, uncertainty §32
13. Fri, Oct. 24 Certificates and PKI, digital signatures §10.4,10.6
14. Mon, Oct. 27 Cryptography and networks §11.1,11.3
15. Wed, Oct 29 Cryptography and networks, Authentication §11.4, 12.1
  Wed, Oct 29 Discussion: Passwords, salts §12.2
16. Fri, Oct 31 Authentication: other methods §12.3-12.6
17. Mon, Nov 3 Identity: users, groups, roles §14.1-14.3
18. Wed, Nov 5 Identity: names, anonymity §14.5
  Wed, Nov 5 Discussion: Review for midterm  
19. Fri, Nov 7 midterm  
20. Mon, Nov 10 Access control mechanisms: ACL, C-List §15.1-15.2
21. Wed, Nov 12 Access control mechanisms: others (Burton) §15.3-15.5
  Wed, Nov 12 Discussion: review of midterm  
22. Fri, Nov 14 Information flow: compiler-based mechanisms §16.1,16.3
23. Mon, Nov 17 Information flow: execution-based mechanisms §16.4-16.5
24. Wed, Nov 19 Assurance: introduction and basic concepts §18
  Wed, Nov 19 Discussion: Review of robust programming  
25. Fri, Nov 21 Assurance: software life cycle §18
26. Mon, Nov 24 Malicious logic: taxonomy §22.1-22.5
27. Wed, Nov 26 Malicious logic: defenses §22.7
  Wed, Nov 26 Discussion: review robust programming, 2 vulnerabilities  
  Fri, Nov 28 no class (Thanksgiving Holiday)  
28. Mon, Dec 1 Malicious logic: defenses; Penetration studies §22.5, 23.1
29. Wed, Dec 3 Flaw Hypothesis Methodology §23.2-23.4
  Wed, Dec 3 Discussion: review for final  
30. Fri, Dec 5 Vulnerability models §23.4
  Tue, Dec 9 final exam 4:00PM to 6:00PM

1. Unless otherwise noted, all readings are from the text.

Here is a PDF version of this document.