This syllabus is tentative and subject to change as needed.
If there is a topic you want to hear about and it is in the syllabus,
please let me know. I won't promise to cover it, but I may ....
|
Date |
Topic |
Reading |
| 1. |
Fri, Sep 29 |
Introduction to Computer Security |
§1 |
| |
Fri, Sep 29 |
Discussion Section:
Robust Programming
|
handout |
|
| 2. |
Mon, Oct 2 |
Introduction; common vulnerabilities |
§1 |
| 3. |
Wed, Oct 4 |
Common vulnerabilities |
|
| 4. |
Fri, Oct 6 |
Principles of secure design |
§13 |
| |
Fri, Oct 6 |
Discussion Section:
Robust Programming, con't
|
handout |
|
| 5. |
Mon, Oct 9 |
Flaw Hypothesis Methodology |
§23.1, 23.2 |
| 6. |
Wed, Oct 11 |
Flaw Hypothesis Methodology |
§23.2 |
| 7. |
Fri, Oct 13 |
Vulnerability models |
§23.3, 23.4 |
| |
Fri, Oct 13 |
Discussion Section:
Writing good code I
|
§29.1–29.3 |
|
| 8. |
Mon, Oct 16 |
Vulnerability models |
§23.3, 23.4 |
| 9. |
Wed, Oct 18 |
Access control matrix model; HRU result |
§2, 3.1, 3.2 |
| 10. |
Fri, Oct 20 |
Policies and their expression |
§4 |
| |
Fri, Oct 20 |
Discussion Section:
Writing good code II
|
§29.4, 29.5 |
|
| 11. |
Mon, Oct 23 |
Confidentiality: Bell-LaPadula |
§5.1, 5.2–5.2.2; 5.3 |
| 12. |
Wed, Oct 25 |
Integrity: Biba, Clark-Wilson |
§6.1, 6.2, 6.4 |
| 13. |
Fri, Oct 27 |
Basic cryptography |
§9.1, 9.2 |
| |
Fri, Oct 27 |
Discussion Section:
Writing good code III
|
§29.6 |
|
| 14. |
Mon, Oct 30 |
Classical cryptography |
§9.2 |
| 15. |
Wed, Nov 1 |
Public key cryptography |
§9.3 |
| 16. |
Fri, Nov 3 |
Cryptographic protocols, signatures, certificates |
§9.4, 10.1, 10.2, 10.4.2, 10.6 |
| |
Fri, Nov 3 |
Discussion Section:
Review for midterm
|
|
|
| 17. |
Mon, Nov 6 |
Midterm exam |
|
| 18. |
Wed, Nov 8 |
Electronic voting |
|
| 19. |
Fri, Nov 10 |
Network security I |
§11.1, 11.3, 11.4.1 |
| |
Fri, Nov 10 |
Discussion Section:
to be arranged |
|
|
| 20. |
Mon, Nov 13 |
Authentication |
§12 |
| 21. |
Wed, Nov 15 |
Identity |
§14 |
| 22. |
Fri, Nov 17 |
Access control mechanisms |
§15 |
| |
Fri, Nov 17 |
Discussion Section:
to be arranged |
|
|
| 23. |
Mon, Nov 20 |
The confinement problem, Trojan horses |
§17.1, 17.2, 22.1, 22.2 |
| 24. |
Wed, Nov 22 |
Computer worms and viruses, other vermin |
§22.3–22.5, 22,7 |
| |
Fri, Nov 24 |
No class (Thanksgiving) |
|
|
| 25. |
Mon, Nov 27 |
Intrusion detection |
|
| 26. |
Wed, Nov 29 |
Network security II |
§26 |
| 27. |
Fri, Dec 1 |
Basics of assurance |
§18 |
| |
Fri, Dec 1 |
Discussion Section:
to be arranged |
|
|
| 28. |
Mon, Dec 4 |
Evaluating systems |
§21 |
| 29. |
Wed, Dec 6 |
to be arranged |
|
| 30. |
Fri, Dec 8 |
to be arranged |
|
| |
Fri, Dec 8 |
Discussion Section:
Review for final
|
|
|
| |
Wed, Dec 13 |
Final exam |
|