Tentative Lecture Plan

 

Tentative lecture flow will be as follows. Some changes may occur depending upon the pace of the class. In the table below, texts highlighted in GREEN in Topics column represent notes I add after the class - in particular with regards to coverage.

Some helpful notes: Some previous experiences of the students and mine that may be helpful to you are as follows:

·         Students who have taken this course have felt that this is a very dense course - primary reason for it being dense is our goal to maintain the NSA IA standards.

·         In earlier offerings of this course, students who lacked strong mathematical background had found the first half of the course, which is focused on theoretical issues, quite challenging. Students are strongly recommended to read the materials before it is covered in the class. Most of the lecture materials will be similar to earlier offerings of the course, with updates and corrections.

·         The second half of the course content is much softer and less effort is needed to understand the concepts - but a lot of reading is required. This helps students to concentrate more on projects and labs/programming assignment.

·         The course is designed primarily with the overall security track in mind. The coverage is also expected to provide a foundational knowledge and broad understanding of security field, if this is the only course the student plan to take.

Tentative Course Schedule

 

 

Lecture/Date

 

Topics

Slides

Week 1

(Sept 2)

Introduction to the course;

Chap 1: Overview of Security

 

(Lecture 1)

(Covered till Slide 31 ..

to be continued next week)

Week 2

(Sept 9)

 

Chap 2.2  Access Control Matrix

 

Access control in OS Unix (Garfinkel book in Text book list in main page)

Microsoft Reference (http://technet.microsoft.com/en-us/library/cc781716.aspx)

 

(NO QUIZ this week)

(Lecture 2.1)

(Covered till Slide 26 .. to be continued next week)

 

Math Review

(Lecture 2.2)

(Not covered ..

to be continued next week)

 

Week 3

(Sept 16)

 

Chap 3 : HRU Access Control Model and results

Chap 4 - 6 : Security Policies, Confidentiality and Integrity Models

 

[Covered Lecture 2.2 & Covered till Slide 23 of Lecture 3]

 

(Quiz 1: THERE WILL BE A QUIZ COVERING WEEKS 1 and 2)

 

(Lecture 3)

 

(Not covered ..

to be continued next week)

Week 4

(Sept 23)

Chap 4 - 6 : Security Policies, Confidentiality and Integrity Models

(Lecture 4)

 

(Covered till slide 21)

Week 5

(Sept 30)

 

Chap 7 : Hybrid Models: Clark Wilson, Chinese Wall,

[recommended readings:

ANSI INCITS 359-2004 RBAC STANDARD  OR NIST RBAC

 The Economic Impact of Role-Based Access Control”]

 

 

(Lecture 5)

Week 6

(Oct 7)

 

Chap 9: Basic Cryptography and Network Security

 

(Quiz2: THERE WILL BE A QUIZ COVERING Lecture 3 onwards)

 

 

(Lecture 6)

 

Week 7

(Oct 14)

 

Continue Lecture 6 (Continue Lecture 6: from Cryptographic Checksum function)

Week 8

(Oct 21)

Guest Lecture by Nathalie (IEEE CIC travel)

Guest Lecture

Week 9

(Oct 28)

MIDTERM

Week 10

(Nov 4)

Chap 10, 11: Key management, Network security

(Lecture 7)

Week 11

(Nov 11)

Information Privacy  (Guest Lecture by Prof Palanisamy)

 

(See Courseweb)

Week 12

(Nov 18)

 

(Continue Lecture 7 from where we left it)

Authentication & Identity (Chap 11)

 

Malicious code (Chapters: 19)

String Vulnerabilities and Race Conditions

(Chapter on String from Seacord’s Secure Programming in C/C++)

 

(Lecture 8)

 

(Lecture 9)

Week  13

(Nov 25)

 

THANKSGIVING

 

Week 14

Dec 2)

Vulnerability Classification

IDS, Auditing, Firewalls (Chap 22, 21)

(Lecture 9.1)

(Lecture 10)

Week  15

(Dec 9)

Legal Issues (Stallings book; Chap 18), Physical Security

(Lecture 11)

Week  16

(Dec 16)

Exam