This syllabus is tentative and subject to change as needed.
If there is a topic you want to hear about and it is in the syllabus,
please let me know. I won't promise to cover it, but I may ....
|
Date |
Topic |
Reading |
1. |
Fri, Sep 29 |
Introduction to Computer Security |
§1 |
|
Fri, Sep 29 |
Discussion Section:
Robust Programming
|
handout |
|
2. |
Mon, Oct 2 |
Introduction; common vulnerabilities |
§1 |
3. |
Wed, Oct 4 |
Common vulnerabilities |
|
4. |
Fri, Oct 6 |
Principles of secure design |
§13 |
|
Fri, Oct 6 |
Discussion Section:
Robust Programming, con't
|
handout |
|
5. |
Mon, Oct 9 |
Flaw Hypothesis Methodology |
§23.1, 23.2 |
6. |
Wed, Oct 11 |
Flaw Hypothesis Methodology |
§23.2 |
7. |
Fri, Oct 13 |
Vulnerability models |
§23.3, 23.4 |
|
Fri, Oct 13 |
Discussion Section:
Writing good code I
|
§29.1–29.3 |
|
8. |
Mon, Oct 16 |
Vulnerability models |
§23.3, 23.4 |
9. |
Wed, Oct 18 |
Access control matrix model; HRU result |
§2, 3.1, 3.2 |
10. |
Fri, Oct 20 |
Policies and their expression |
§4 |
|
Fri, Oct 20 |
Discussion Section:
Writing good code II
|
§29.4, 29.5 |
|
11. |
Mon, Oct 23 |
Confidentiality: Bell-LaPadula |
§5.1, 5.2–5.2.2; 5.3 |
12. |
Wed, Oct 25 |
Integrity: Biba, Clark-Wilson |
§6.1, 6.2, 6.4 |
13. |
Fri, Oct 27 |
Basic cryptography |
§9.1, 9.2 |
|
Fri, Oct 27 |
Discussion Section:
Writing good code III
|
§29.6 |
|
14. |
Mon, Oct 30 |
Classical cryptography |
§9.2 |
15. |
Wed, Nov 1 |
Public key cryptography |
§9.3 |
16. |
Fri, Nov 3 |
Cryptographic protocols, signatures, certificates |
§9.4, 10.1, 10.2, 10.4.2, 10.6 |
|
Fri, Nov 3 |
Discussion Section:
Review for midterm
|
|
|
17. |
Mon, Nov 6 |
Midterm exam |
|
18. |
Wed, Nov 8 |
Electronic voting |
|
19. |
Fri, Nov 10 |
Network security I |
§11.1, 11.3, 11.4.1 |
|
Fri, Nov 10 |
Discussion Section:
to be arranged |
|
|
20. |
Mon, Nov 13 |
Authentication |
§12 |
21. |
Wed, Nov 15 |
Identity |
§14 |
22. |
Fri, Nov 17 |
Access control mechanisms |
§15 |
|
Fri, Nov 17 |
Discussion Section:
to be arranged |
|
|
23. |
Mon, Nov 20 |
The confinement problem, Trojan horses |
§17.1, 17.2, 22.1, 22.2 |
24. |
Wed, Nov 22 |
Computer worms and viruses, other vermin |
§22.3–22.5, 22,7 |
|
Fri, Nov 24 |
No class (Thanksgiving) |
|
|
25. |
Mon, Nov 27 |
Intrusion detection |
|
26. |
Wed, Nov 29 |
Network security II |
§26 |
27. |
Fri, Dec 1 |
Basics of assurance |
§18 |
|
Fri, Dec 1 |
Discussion Section:
to be arranged |
|
|
28. |
Mon, Dec 4 |
Evaluating systems |
§21 |
29. |
Wed, Dec 6 |
to be arranged |
|
30. |
Fri, Dec 8 |
to be arranged |
|
|
Fri, Dec 8 |
Discussion Section:
Review for final
|
|
|
|
Wed, Dec 13 |
Final exam |
|