# |
date |
topic |
reading1 and notes |
1. |
Fri, Sep 26 |
Introduction; what is computer security |
§1 |
2. |
Mon, Sep 29 |
Principles of secure design |
§13 |
3. |
Wed, Oct 1 |
Robust programming |
handout |
|
Wed, Oct 1 |
Discussion: class project, robust programming |
|
4. |
Fri, Oct 3 |
Access control matrix, HRU result |
§2, 3.1-3.2 |
5. |
Mon, Oct 6 |
Security policies |
§4.1-4.4, 4.6 |
6. |
Wed, Oct 8 |
Confidentiality models: Bell-LaPadula Model (Walcott) |
§5.1,5.2.1-5.2.2 |
|
Wed, Oct 8 |
Discussion: Attack analysis (Walcott) |
§30 |
7. |
Fri, Oct 10 |
Distributed denial of service (Prof. Wu) |
§ |
8. |
Mon, Oct 13 |
Integrity models: Biba strict integrity, Clark-Wilson |
§6.1,6.2.3,6.4 |
9. |
Wed, Oct 15 |
Basic cryptography: classical |
§9.1-9.2 |
|
Wed, Oct 15 |
Discussion: modular arithmetic, Euclidean algorithm |
§31 |
10. |
Fri, Oct 17 |
Basic cryptography: public key |
§9.3 |
11. |
Mon, Oct 20 |
Basic cryptography: cryptographic hashes |
§9.4 |
12. |
Wed, Oct 22 |
Key distribution |
§10.1-10.2 |
|
Wed, Oct 22 |
Discussion: Entropy, uncertainty |
§32 |
13. |
Fri, Oct. 24 |
Certificates and PKI, digital signatures |
§10.4,10.6 |
14. |
Mon, Oct. 27 |
Cryptography and networks |
§11.1,11.3 |
15. |
Wed, Oct 29 |
Cryptography and networks, Authentication |
§11.4, 12.1 |
|
Wed, Oct 29 |
Discussion: Passwords, salts |
§12.2 |
16. |
Fri, Oct 31 |
Authentication: other methods |
§12.3-12.6 |
17. |
Mon, Nov 3 |
Identity: users, groups, roles |
§14.1-14.3 |
18. |
Wed, Nov 5 |
Identity: names, anonymity |
§14.5 |
|
Wed, Nov 5 |
Discussion: Review for midterm |
|
19. |
Fri, Nov 7 |
midterm |
|
20. |
Mon, Nov 10 |
Access control mechanisms: ACL, C-List |
§15.1-15.2 |
21. |
Wed, Nov 12 |
Access control mechanisms: others (Burton) |
§15.3-15.5 |
|
Wed, Nov 12 |
Discussion: review of midterm |
|
22. |
Fri, Nov 14 |
Information flow: compiler-based mechanisms |
§16.1,16.3 |
23. |
Mon, Nov 17 |
Information flow: execution-based mechanisms |
§16.4-16.5 |
24. |
Wed, Nov 19 |
Assurance: introduction and basic concepts |
§18 |
|
Wed, Nov 19 |
Discussion: Review of robust programming |
|
25. |
Fri, Nov 21 |
Assurance: software life cycle |
§18 |
26. |
Mon, Nov 24 |
Malicious logic: taxonomy |
§22.1-22.5 |
27. |
Wed, Nov 26 |
Malicious logic: defenses |
§22.7 |
|
Wed, Nov 26 |
Discussion: review robust programming, 2 vulnerabilities |
|
|
Fri, Nov 28 |
no class (Thanksgiving Holiday) |
|
28. |
Mon, Dec 1 |
Malicious logic: defenses; Penetration studies |
§22.5, 23.1 |
29. |
Wed, Dec 3 |
Flaw Hypothesis Methodology |
§23.2-23.4 |
|
Wed, Dec 3 |
Discussion: review for final |
|
30. |
Fri, Dec 5 |
Vulnerability models |
§23.4 |
|
Tue, Dec 9 |
final exam |
4:00PM to 6:00PM |