# | date | topic | reading1 and notes |
---|---|---|---|
1. | Tue, Apr 1 | Introduction to computer security | §1, §13 |
2. | Thu, Apr 3 | Access control matrix, HRU result; Take-Grant | §2, §3.1-3.3 |
3. | Tue, Apr 8 | Take-Grant; SPM, expressive power | §3.3-3.4 |
4. | Thu, Apr 10 | Policies, Bell-LaPadula Model | §4.1-4.4, 4.7; §5.1-5.3 |
5. | Tue, Apr 15 | System Z; Integrity models | §5.4, §6 |
6. | Thu, Apr 17 | Chinese Wall Model, CISS, ORCON, RBAC | §7 |
7. | Tue, Apr 22 | Noninterference, Nondeducibility | §8.1-8.3 |
8. | Thu, Apr 24 | More Noninterference, Nondeducibility | §8.4-8.5 |
9. | Tue, Apr 29 | Cryptography: classical, public key, checksums | §9 |
10. | Thu, May 1 | Key management | §10 |
11. | Tue, May. 6 | Applying ciphers | §11 |
12. | Thu, May. 8 | Authentication and identity | §12, §14 |
13. | Tue, May 13 | Access control mechanisms | §15 |
14. | Thu, May 15 | Information flow | §16 |
15. | Tue, May 20 | Confinement, isolation, covert channels | §17 |
16. | Thu, May 23 | Assurance in systems | §18, §19.1 |
17. | Tue, May 27 | More assurance, evaluation of systems | §19.2-19.3, §21 |
18. | Thu, May 29 | Formal Methods | §20 |
19. | Tue, June 3 | Vulnerability analysis | §23 |
20. | Thu, June 5 | Auditing | §24 |
This syllabus is tentative and subject to change as needed. If there is a topic you want to hear about and it is in the syllabus, please let me know. I won't promise to cover it, but I may ....