| 
 #  | 
 date  | 
 topic  | 
 reading1 and notes  | 
|---|---|---|---|
| 
 1.  | 
 Mon, Jan 6  | 
 Introduction; what is computer security  | 
 §1  | 
| 
 2.  | 
 Wed, Jan 8  | 
 Introduction (con't); principles of secure design  | 
 §1, §13  | 
| 
 3.  | 
 Fri, Jan 10  | 
 Penetration analysis  | 
 §23.1-23.2  | 
| 
 
  | 
 Fri, Jan 10  | 
 Discussion: class project  | 
 
  | 
| 
 4.  | 
 Mon, Jan 13  | 
 Vulnerability models  | 
 §23.3-23.4  | 
| 
 5.  | 
 Wed, Jan 15  | 
 Security in programming  | 
 
§29  | 
| 
 6.  | 
 Fri, Jan 17  | 
 Robust programming  | 
 §handout  | 
| 
 
  | 
 Fri, Jan 17  | 
 Discussion: security in programming  | 
 
  | 
| 
 
  | 
 Mon, Jan 20  | 
 no class (Martin Luther King Day)  | 
 
  | 
| 
 7.  | 
 Wed, Jan 22  | 
 Access control matrix, HRU result  | 
 
§2, 3.1-3.2  | 
| 
 8.  | 
 Fri, Jan 24  | 
 Policies and policy languages  | 
 §4.1-4.5  | 
| 
 
  | 
 Fri, Jan 24  | 
 Discussion: none (virtual Monday)  | 
 
  | 
| 
 9.  | 
 Mon, Jan 27  | 
 Confidentiality, Bell-LaPadula  | 
 §30,5.1-5.2.2.2  | 
| 
 10.  | 
 Wed, Jan 29  | 
 Integrity: Biba, Clark-Wilson  | 
 
§6.1-6.2,6.4  | 
| 
 11.  | 
 Fri, Jan 31  | 
 Hybrids: Chinese Wall, ORCON, RBAC  | 
 §7.1,7.3-7.4  | 
| 
 
  | 
 Fri, Jan 31  | 
 Discussion: modular arithmetic, Euclidean algorithm  | 
 §31  | 
| 
 12.  | 
 Mon, Feb. 3  | 
 Classical cryptography  | 
 §9.1-9.2.4  | 
| 
 13.  | 
 Wed, Feb. 5  | 
 Public key cryptography, cryptographic hash functions  | 
 §9.3-9.4 project design due  | 
| 
 14.  | 
 Fri, Feb 7  | 
 Key management, certificates  | 
 §10.1-10.2,10.4,10.6  | 
| 
 
  | 
 Fri, Feb 7  | 
 Discussion: review for midterm  | 
 
  | 
| 
 15.  | 
 Mon, Feb 10  | 
 Applications and examples of ciphers  | 
 
§11.1-11.3, 11.4.2  | 
| 
 16.  | 
 Wed, Feb 12  | 
 midterm  | 
 
  | 
| 
 17.  | 
 Fri, Feb 14  | 
 Authentication and identity  | 
 §12,14.1-14.4,14.6  | 
| 
 
  | 
 Fri, Feb 14  | 
 Discussion: Review of midterm  | 
 
  | 
| 
 
  | 
 Mon, Feb 17  | 
 no class (Presidents' Day)  | 
 
  | 
| 
 18.  | 
 Wed, Feb 19  | 
 Access control: ACLs, C-Lists, Locks and Keys  | 
 §15.1-15.4  | 
| 
 19.  | 
 Fri, Feb 21  | 
 Confinement Problem: Sandbox, Virtual Machine  | 
 §17.1-17.2  | 
| 
 
  | 
 Fri, Feb 21  | 
 Discussion: to be arranged  | 
 
  | 
| 
 20.  | 
 Mon, Feb 24  | 
 Basics of Assurance  | 
 
§18  | 
| 
 21.  | 
 Wed, Feb 26  | 
 Evaluation of systems  | 
 §21.1-21.2,21.7,21.8  | 
| 
 22.  | 
 Fri, Feb 28  | 
 Malicious logic: Trojan horses, computer viruses  | 
 §22.1-22.5  | 
| 
 
  | 
 Fri, Feb 28  | 
 Discussion: Examples of computer viruses  | 
 
  | 
| 
 23.  | 
 Mon, Mar 3  | 
 Malicious logic: defenses  | 
 §22.7  | 
| 
 24.  | 
 Wed, Mar 5  | 
 Auditing  | 
 §24.1-24.4  | 
| 
 25.  | 
 Fri, Mar 7  | 
 Intrusion detection  | 
 §25.1-23.4,25.6  | 
| 
 
  | 
 Fri, Mar 7  | 
 Discussion: to be arranged  | 
 
  | 
| 
 26.  | 
 Mon, Mar 10  | 
 Network security  | 
 
§26  | 
| 
 27.  | 
 Wed, Mar 12  | 
 to be arranged  | 
 
  | 
| 
 28.  | 
 Fri, Mar 14  | 
 to be arranged  | 
 project due  | 
| 
 
  | 
 Wed, Mar 19  | 
 final exam, both sections  | 
 1:30PM to 3:30PM  | 
This syllabus is tentative and subject to change as needed. If there is a topic you want to hear about and it is in the syllabus, please let me know. I won't promise to cover it, but I may ....
1. Unless otherwise noted, all readings are from the text.