COS 496: Information SecuritySpring 1999 |
General information
Schedule Homework |
Date | Lecture topic | Reading | Hand In |
Tue 2 Feb | Introductory Case Study | ||
Thu 4 Feb | Goals and Vulnerabilities | chapter 1 | |
Tue 9 Feb | Secret-Decoder-Ring Crypto | chapter 2 | |
Thu 11 Feb | Modern Ciphers | 3.1-3.5, 3.8-3.9 | |
Tue 16 Feb | Other Crypto Primitives | 3.6-3.7 | Assignment 1: Breaking a Cryptosystem |
Thu 18 Feb | Crypto Protocols | chapter 4 | |
Tue 23 Feb | Key Management | ||
Thu 25 Feb | Viruses | 5.1 | Assignment 2: Lottery Security Design |
Tue 2 Mar | Containing Malicious Programs | 5.2-5.6 | |
Thu 4 Mar | Buggy Programs and Security | ||
Tue 9 Mar | Memory Safety | Assignment 3: Lottery Analysis | |
Thu 11 Mar | Secure Services | 6.1, 6.3 | |
Tue 23 Mar | Military-Style Security Policies | chapter 7 | |
Thu 25 Mar | Commercial-Style Security Policies | Assignment 4: Forensic Security | |
Tue 30 Mar | Network Security: Protecting the Infrastructure | 9.1-9.3 | |
Thu 1 Apr | Firewalls and Virtual Private Networks | 9.5 | |
Tue 6 Apr | Privacy and Anonymity | Project Proposal | |
Thu 8 Apr | E-Commerce Security: On-line systems | ||
Tue 13 Apr | E-Commerce Security: Off-line systems | Project Description | |
Thu 15 Apr | Physical Security and Tamper-Resistant Devices | ||
Tue 20 Apr | Proofs about Programs | ||
Thu 22 Apr | Intellectual Property and Copy Protection | chapter 11 | |
Tue 27 Apr | Law, Crime, Ethics, and Security | chapter 11 | |
Thu 29 Apr | Penetration Testing | ||
Tue 11 May | Course Project Writeup |