| # | date | topic | reading1 and notes | 
|---|---|---|---|
| 1. | Fri, Sep 26 | Introduction; what is computer security | §1 | 
| 2. | Mon, Sep 29 | Principles of secure design | §13 | 
| 3. | Wed, Oct 1 | Robust programming | handout | 
| Wed, Oct 1 | Discussion: class project, robust programming | ||
| 4. | Fri, Oct 3 | Access control matrix, HRU result | §2, 3.1-3.2 | 
| 5. | Mon, Oct 6 | Security policies | §4.1-4.4, 4.6 | 
| 6. | Wed, Oct 8 | Confidentiality models: Bell-LaPadula Model (Walcott) | §5.1,5.2.1-5.2.2 | 
| Wed, Oct 8 | Discussion: Attack analysis (Walcott) | §30 | |
| 7. | Fri, Oct 10 | Distributed denial of service (Prof. Wu) | § | 
| 8. | Mon, Oct 13 | Integrity models: Biba strict integrity, Clark-Wilson | §6.1,6.2.3,6.4 | 
| 9. | Wed, Oct 15 | Basic cryptography: classical | §9.1-9.2 | 
| Wed, Oct 15 | Discussion: modular arithmetic, Euclidean algorithm | §31 | |
| 10. | Fri, Oct 17 | Basic cryptography: public key | §9.3 | 
| 11. | Mon, Oct 20 | Basic cryptography: cryptographic hashes | §9.4 | 
| 12. | Wed, Oct 22 | Key distribution | §10.1-10.2 | 
| Wed, Oct 22 | Discussion: Entropy, uncertainty | §32 | |
| 13. | Fri, Oct. 24 | Certificates and PKI, digital signatures | §10.4,10.6 | 
| 14. | Mon, Oct. 27 | Cryptography and networks | §11.1,11.3 | 
| 15. | Wed, Oct 29 | Cryptography and networks, Authentication | §11.4, 12.1 | 
| Wed, Oct 29 | Discussion: Passwords, salts | §12.2 | |
| 16. | Fri, Oct 31 | Authentication: other methods | §12.3-12.6 | 
| 17. | Mon, Nov 3 | Identity: users, groups, roles | §14.1-14.3 | 
| 18. | Wed, Nov 5 | Identity: names, anonymity | §14.5 | 
| Wed, Nov 5 | Discussion: Review for midterm | ||
| 19. | Fri, Nov 7 | midterm | |
| 20. | Mon, Nov 10 | Access control mechanisms: ACL, C-List | §15.1-15.2 | 
| 21. | Wed, Nov 12 | Access control mechanisms: others (Burton) | §15.3-15.5 | 
| Wed, Nov 12 | Discussion: review of midterm | ||
| 22. | Fri, Nov 14 | Information flow: compiler-based mechanisms | §16.1,16.3 | 
| 23. | Mon, Nov 17 | Information flow: execution-based mechanisms | §16.4-16.5 | 
| 24. | Wed, Nov 19 | Assurance: introduction and basic concepts | §18 | 
| Wed, Nov 19 | Discussion: Review of robust programming | ||
| 25. | Fri, Nov 21 | Assurance: software life cycle | §18 | 
| 26. | Mon, Nov 24 | Malicious logic: taxonomy | §22.1-22.5 | 
| 27. | Wed, Nov 26 | Malicious logic: defenses | §22.7 | 
| Wed, Nov 26 | Discussion: review robust programming, 2 vulnerabilities | ||
| Fri, Nov 28 | no class (Thanksgiving Holiday) | ||
| 28. | Mon, Dec 1 | Malicious logic: defenses; Penetration studies | §22.5, 23.1 | 
| 29. | Wed, Dec 3 | Flaw Hypothesis Methodology | §23.2-23.4 | 
| Wed, Dec 3 | Discussion: review for final | ||
| 30. | Fri, Dec 5 | Vulnerability models | §23.4 | 
| Tue, Dec 9 | final exam | 4:00PM to 6:00PM |