Computer Science 530 - Syllabus and Reading List -- Fall 2019

Except as noted Lectures are held Friday morning from 9:00AM to 11:45AM OHE 122.

This is our expected Syllabus and reading list. Most topics will take several lectures to cover. In addition to the primary discussion for each lecture, 5-10 minutes of each lecture will be set aside for discussion of current events in the computer security arena. Specific coverage within each leacture will be updated from year to year to keep the course material up to date with current practice.

Dates may change depending on progress throug the semester. Reading assignments are designated as such. Links from system names in the syllabus are for general information only.

Readings are on topics related to the lecture, but lectures are not from the book. Students are expected to have completed the assigned readings prior to lecture so that they have backround appropriate for class discussion.

p
DateTopic/ReadingsSlidesLab Info
Lecture 1
August 30
2019
  • The Security Problem
    • A working definition of security
    • Evaluating security
    • Systems security vs network security vs data security
    • Societal aspects of security, ethical and legal foundations
  • Readings:
    • Bishop, Chapter 1, An Overview of Computer Security
  • PPT, PDF Lab Introduction.
    Lecture 2
    September 6
    2019
  • Cryptography - An Overview
    • Secret key cryptography
    • Public key cryptography
    • Hashes and message digests
    • Steganography
  • Readings:
    • Bishop, Chapter 9, Basic Cryprography
    • Bishop, Chapter 11 (only through section through 11.2), Cipher Techniques
    • Garfinkel (Is Encryption Doomed)
  • - Cryptography
    Lecture 3
    September 13
    2019
  • Key management
    • Diffie-Hellman Key Exchange
    • Ties to Authentication Protocols
    • Public-key Key Exchange (PGP, X.500, S/MIME)
    • Peer-to-peer
    • Group key management
  • Readings:
  • PDF at Slide 61 Authentication
    Lecture 4,5
    September 20,27
    2019
  • Authentication and Identity Management
    • Password-based authentication
    • Unix vs Windows
    • Kerberos
    • X.500
    • Hardware authentication
    • Biometrics
    • (plus more material to be added)
  • Readings
  • PDF at Slide 104 PDF at Slide 138 Authorization
    Application Security
    Lecture 6
    October 4, 2019
  • Authorization and Policy
    • Policy
    • ACLs
    • GAA-API
  • Readings:
  • Packet Sniffing
    Mid-term
    October 11
    2019
  • Mid-Term Exam (9:00 AM - 10:40 AM)
  • Followed by start of lecture on untrusted computing
    TG
    October 18th
    2019
  • USC Fall Recess, No Lecture, Note this is a scheduled USC recess this year.
  • N/A None
    Lecture 8
    October 25
    2019
    • Viruses
    • Worms
    • Spyware
    • Denial of service attacks
    • Transmission vectors, e.g. spam
  • Readings
  • .
    Lecture 9
    Novemner 1
    2019
  • Countermeasures
    • Firewalls
    • Virus checkers
    • Patch and configuration management
  • Readings
      Bishop, Chapters 26 and 27, Network and System Security
  • Intrusion Detection
    Lecture 10
    November 8
    2019
    (will extend into lecture 11)
  • Intrusion detection and response
    • Commercial Itrusion Detection Systems
    • Research Itrusion Detection Systems
    • Response systems
  • Readings
  • .
    .
    Arp Spoofing
    Lecture 11
    November 15th
    2019
  • The Human Element
    • Social Engineering
      • Phishing
      • Character sets
    • Complexity of proper security deployment
      • Configuration issues
      • Passwords
  • Readings
  • -- Tunnels/VPNs
    Lecture 12
    November 22nd
    2019
  • Trusted Computing
    • The Public Perception of Trusted Computing
    • The Hardware Basis for Trusted Computing
    • The Software and OS Basis for Trusted Computing
    • Virtualization
    • Negotiating Trust and Obligation
    • Case Studies
  • Readings
  • Forensics
    TG
    November 29th
    2019
  • Thanksgiving Recess, No Lecture
  • N/A None
    Lecture 13
    December 6th
    2019
  • Privacy, Plus CyberPysical Systems, Cloud Computing and other topics.
  • none
    Final Exam
    Monday
    December 16,
    2019
  • Final Exam (11:00 AM - 1:00 PM)
  • N/A None