Lectures

Lecture videos

 

Date

Lecture No.

Slides

Readings

8/24/09

Lecture 1

Introduction to class and computer security overview. (pdf)

"Computer Security: Art and Science" (CS) Chapter 1

8/26/09

Lecture 2

Security Policy (pdf)

CS Chapter 4 (skip last section)

8/28/09

Lecture 3

Risk Analysis (pdf)

CS Chapter 1 and risk analysis reading on compass.

8/31/09

Lecture 4

Class exercise: Risk analysis

9/2/09

Lecture 5

Classical cryptography (pdf)

CS Chapter 9 section 1 through 2.2

9/4/09

Lecture 6

Enigma movie. Link posted on class newsgroup.

9/9/09

Lecture 7

Private key cryptography. (pdf)

CS Chapter 9 section 2.3 and 2.4
For DES - Handbook of Applied Cryptography Chapter 7
For AES - AES Standard issued as FIPS PUB 197

9/11/09

Lecture 8

Review symetric ciphers and address cipher techniques.

CS Chapter 11 section 1 and 2

9/14/09

Lecture 9

Class exercise: A card-based stream cipher. Bring a deck of cards with two jokers. I'll have a few extra decks but not enough for everyone. Exercise notes

Schneier's description of the Solitaire Encryption Algorithm

9/16/09

Lecture 10

Public key cryptography and crypto hash (pdf)

CS Chapter 9 section 3 and 4

9/18/09

Lecture 11

Cover Crypto Hash from Wednesday's slide set.

CS Chapter 9

9/21/09

Lecture 12

Key Management (pdf)

CS Chapter 10

9/23/09

Lecture 13

Continue on with key management. Possibly start Authentication.

CS Chapter 12

9/25/09

Lecture 14

Class exercise: PKI and certificates PKI scenario Certificates

9/28/09

Lecture 14

Authentication Authentication (pdf)

CS Chapter 12

9/30/09

Lecture 15

Finish up authentication. Access Control Matrix Access control matrix (pdf)

CS Chapter 2

10/2/09

Lecture 17

Brief presentation from Dr. Masooda Bashir on the ICSSP program. Finish access control matrix.

10/5/09

Lecture 18

Exam review Exam review (pdf)
Exam from 2007 Exam key Calculator was allowed on the exam in 2007 and the test period was 1 hour 15 minutes instead of 50 minutes.

Exam ground rules:

  • A single page of supplementary notes is allowed
  • Closed book
  • No calculators
  • Students should show work on the exam. They can use supplementary sheets of paper if they run out of room.
  • Students can use scratch paper if desired.

10/07/09

Exam 1

Exam 1: Covering basic policy, risk analysis, applied cryptography, and general OS security.

Exam given in class room at normal lecture time. You will be given 50 minutes to complete the exam.

10/9/09

Lecture 19

Discuss exam results
Access control techniques Access Control Techniques (pdf)

Exam 1 answers and comments Chapter 15

10/12/09

Lecture 20

Guest Lecturer: Omid Fatemieh
Confidentiality Policy Confidentiality Policy (pdf)

CS Chapters 5 (5.1 and 5.2 up to the beginning of 5.2.3, and 5.3) and 30 (Lattices).
Additional readings if you are interested in digging deeper: BLP original papers: vol 1 vol 2.
McLean's dagger property paper and McLean's Z system paper

10/14/09

Lecture 21

Guest Lecturer: Fariba Khan
Integrity Policies Integrity Policies (pdf)

CS Chapter 6

10/17/08

Lecture 22

Database security DB Security (pdf)

Griffiths and Wade, "An Authorization Mechanism for a Relational Database"

10/19/09

Lecture 23

System Evaluation: Common Criteria System evaluation (pdf)

CS Chapter 21

10/21/09

Lecture 24

Design Principles and System Assurance Design principles (pdf) and System assurance (pdf)

CS chapters 13 and 18

10/23/09

Lecture 25

Guest Lecturer: Paul McNabb, Argus Systems
Trusted Operating Systems

10/26/09

Lecture 26

Designing Secure Software Designing secure software (pdf)

CS chapter 19 and Threat analysis reading posted to compass

10/28/09

Lecture 27

Finish Designing secure software and starting Malware (pdf)

CS Chapter 22

10/30/08

Lecture 28

More Malware

11/2/09

Lecture 29

Still more malware.

11/4/09

Lecture 30

Network threats and networking review (pdf)

CS Chapter 26

11/6/09

Lecture 31

More Networking threats and networking review.

CS Chapter 26

11/9/09

Lecture 32

DNS issues from previous lecture. Network security controls and architecture (pdf)

CS Chapter 26

11/11/09

Lecture 33

More Newtork security controls and architecture.

11/13/09

Lecture 34

Security and Law (pdf)

Spying and the law reading on compass. CyberLaw I lesson

11/16/09

Lecture 35

Exam review (pdf)

Exam from a past year Key from a past year

11/18/09

Exam 2

Exam 2: Covering Databases, Trusted OS, Malware, Software assurance, network security, security law.

In 1310 DCL at normal class time

11/20/09

Lecture 36

Return and review exams

Exam 2 answers and comments

11/30/09

Lecture 37

IPSec and SSL (pdf)

Later part of CS Chapter 11

12/2/09

Lecture 38

Physical security and forensics (pdf)

Forensics reading on compass

12/4/09

Lecture 40

EMSEC

Soft TEMPEST paper

12/7/09

Lecture 41

Wireless security (pdf)

Unsafe at Any Key Size. Tech. Rep. 00/362 Practical Attacks Against WEP and WPA

12/9/09

Lecture 42

Exam review (pdf)

12/16/09

12/18/09

I2CS Final

In-class final

Cumulative final at 8am.
Last name A to O goto 1310 DCL.
Last name P to Z goto 138 Henry Administration Building (HAB).