ECS 235B, Winter 2022: Foundations of Computer and Information Security

Announcements

Class Information

Homework

Project

Handouts

Lecture Outlines

  1. Lecture #  1 (Jan 10)
  2. Lecture #  2 (Jan 12)
  3. Lecture #  3 (Jan 17)
  4. Lecture #  4 (Jan 19)
  5. Lecture #  5 (Jan 24)
  6. Lecture #  6 (Jan 26)
  7. Lecture #  7 (Jan 31)
  8. Lecture #  8 (Feb   2)
  9. Lecture #  9 (Feb   7)
  10. Lecture #10 (Feb 14)
  11. Lecture #11 (Feb 16)
  12. Lecture #12 (Feb 21)
  13. Lecture #13 (Feb 23)
  14. Lecture #14 (Feb 28)
  15. Lecture #15 (Mar 2)
  16. Lecture #16 (Mar 7)
  17. Lecture #17 (Mar 9)
  18. Lecture #18 (Mar 14)

Modules

Audio versions are PowerPoint with recordings, and are large

  1. Administrative Material (audio version)
  2. Basic Components (audio version)
  3. Reference Monitors (audio version)
  4. Access Control Matrix (audio version)
  5. Attribute-Based Access Control Matrix (audio version)
  6. HRU Result (audio version)
  7. Take-Grant Model Rules (audio version)
  8. Sharing in the Take-Grant Model (audio version)
  9. Stealing in the Take-Grant Model (audio version)
  10. Schematic Protection Model (audio version)
  11. Expressiveness (audio version)
  12. Typed Access Matrix Model (audio version)
  13. Security Policies (audio version)
  14. Security Policy Languages (audio version)
  15. Precise and Secure Policies (audio version)
  16. Lattices (audio version)
  17. Confidentiality Policies and the Bell-LaPadula Model (audio version)
  18. Bell-LaPadula Model (audio version)
  19. Applying the Bell-LaPadula Model (audio version)
  20. Tranquility (audio version)
  21. The Controversy and System Z (audio version)
  22. Integrity Requirements and the Biba Model (audio version)
  23. Clark-Wilson Model (audio version)
  24. Trust Models (audio version)
  25. Constraint-Based Availability Models (audio version)
  26. State-Based Availability Models (audio version)
  27. Network Flooding (audio version)
  28. Chinese Wall Model (audio version)
  29. Clinical Information Systems Security Policy (audio version)
  30. Originator-Control Access Control (audio version)
  31. Role-Based Access Control (audio version)
  32. Traducement (audio version)
  33. Break-the-Glass Policies (audio version)
  34. Policy Composition (audio version)
  35. Introduction to Noninterference (audio version)
  36. Security Policy and the Unwinding Theorem (audio version)
  37. Access Control Matrix Revisited (audio version)
  38. Generalized Noninterference (audio version)
  39. Policy Composition I (audio version)
  40. Nondeducibility (audio version)
  41. Restrictiveness (audio version
  42. Side Channels (audio version)
  43. Introduction to Assurance (audio version)
  44. Building Systems with Assurance (audio version)
  45. Design Assurance Techniques (audio version)
  46. Implementation Assurance Techniques (audio version)
  47. Entropy (audio version)
  48. Introduction to Information Flow (audio version)
  49. Implementation Flow Policies (audio version)
  50. Confinement Problem (audio version)
  51. Isolation (audio version)
  52. Covert Channels (audio version)
  53. Detecting Covert Channels (audio version
  54. Analyzing Covert Channels (audio version)
  55. Mitigating Covert Channels (audio version)
  56. Design Principles (audio version)
  57. Program Security (audio version)
  58. Evaluating Systems (audio version)