Computer Science 530 - Syllabus and Reading List -- Fall 2020

Except as noted Lectures are held online Friday morning from 9:00AM to 11:45AM.

This is our expected Syllabus and reading list. Most topics will take several lectures to cover. In addition to the primary discussion for each lecture, 5-10 minutes of each lecture will be set aside for discussion of current events in the computer security arena. Specific coverage within each leacture will be updated from year to year to keep the course material up to date with current practice.

Dates may change depending on progress throug the semester. Reading assignments are designated as such. Links from system names in the syllabus are for general information only.

Readings are on topics related to the lecture, but lectures are not from the book. Students are expected to have completed the assigned readings prior to lecture so that they have backround appropriate for class discussion.

p
DateTopic/ReadingsSlidesLab Info
Lecture 1
August 28
2020
  • The Security Problem
    • A working definition of security
    • Evaluating security
    • Systems security vs network security vs data security
    • Societal aspects of security, ethical and legal foundations
  • Readings:
    • Bishop, Chapter 1, An Overview of Computer Security
  • PPT, PDF Lab Introduction.
    Lecture 2
    September 4
    2020
  • Cryptography - An Overview
    • Secret key cryptography
    • Public key cryptography
    • Hashes and message digests
    • Steganography
  • Readings:
    • Bishop, Chapter 9, Basic Cryprography
    • Bishop, Chapter 11 (only through section through 11.2), Cipher Techniques
    • Garfinkel (Is Encryption Doomed)
  • PPT, PDF @ Slide 37 Cryptography
    Lecture 3
    September 11
    2020
  • Key management
    • Diffie-Hellman Key Exchange
    • Ties to Authentication Protocols
    • Public-key Key Exchange (PGP, X.500, S/MIME)
    • Peer-to-peer
    • Group key management
  • Readings:
  • PPT, PDF @ Slide 86 Authentication
    Lecture 4,5
    September 18,25
    2020
  • Authentication and Identity Management
    • Password-based authentication
    • Unix vs Windows
    • Kerberos
    • X.500
    • Hardware authentication
    • Biometrics
    • (plus more material to be added)
  • Readings
  • PPT, PDF @ Slide 121 Authorization
    Application Security
    Lecture 6
    October 2, 2020
  • Authorization and Policy
    • Policy
    • ACLs
    • GAA-API
  • Readings:
  • Packet Sniffing
    Mid-term
    October 9
    2020
  • Mid-Term Exam (9:00 AM - 10:40 AM)
  • Also Lecture on untrusted computing. Packet Sniffing
    Lecture 8
    October 16
    2020
    • Viruses
    • Worms
    • Spyware
    • Denial of service attacks
    • Transmission vectors, e.g. spam
  • Readings
  • Intrusion Detection
    Lecture 9
    October 23
    2020
  • Countermeasures
    • Firewalls
    • Virus checkers
    • Patch and configuration management
  • Readings
      Bishop, Chapters 26 and 27, Network and System Security
  • ARP Spoofing
    Lecture 10
    October 30
    2020
    (will extend into lecture 11)
  • Intrusion detection and response
    • Commercial Itrusion Detection Systems
    • Research Itrusion Detection Systems
    • Response systems
  • Readings
  • .
    .
    Tunnels and VPNs
    Lecture 11
    November 6th
    2020
  • The Human Element
    • Social Engineering
      • Phishing
      • Character sets
    • Complexity of proper security deployment
      • Configuration issues
      • Passwords
  • Readings
  • -- Filesystem Labeling
    Lecture 12
    November 13
    2020
  • Trusted Computing
    • The Public Perception of Trusted Computing
    • The Hardware Basis for Trusted Computing
    • The Software and OS Basis for Trusted Computing
    • Virtualization
    • Negotiating Trust and Obligation
    • Case Studies
  • Readings
  • Forensics
    Lecture 13
    November 20
    2020
  • Privacy, Plus CyberPysical Systems, Cloud Computing and other topics.
  • none
    Final Exam
    Monday
    December 7,
    2020
  • Final Exam (11:00 AM - 1:00 PM)
  • N/A None