Date |
Lectures Topics |
Notes |
|
Assignment |
Thu 1/4 |
Class
overview, motivation and overview of
computer security |
[ppt] |
Stallings, Chapter 1 |
|
Tue 1/9 |
Cryptography: symmetric
encryption (DES/AES algorithms) |
[ppt] |
Stallings, Chapter 2.1-2.3,
3.1-3.3, 5.1 KPS, Chapter 3.1-3.3 |
Project 1 out. |
Thu 1/11 |
Cryptography: asymmetric
encryption (RSA) |
[ppt] |
KPS, Chapter 6.1-6.3 Stallings, Chapter 9 |
Homework 1 out. |
Tue 1/16 |
Cryptography: one-way
hashing and message digests (MD5, SHA-1) |
[ppt] |
KPS, Chapter 5.1-5.2,
5.5-5.6
Stallings 11.4-11.5,
12.1-12.2 |
|
Thu 1/18 |
User Authentication |
[ppt] |
KPS, Chapter 9.6-9.7,
10.1-10.3, 10.8, 10.10, Stallings Password
Security: A Case History, R. Morris and K. Thompson, Communications of
ACM, vol.22 no.11, 1979. |
Project |
Tue 1/23 |
Distributed system
authentication |
Stallings |
Homework Project 2 out. |
|
Thu 1/25 |
Internet vulnerability: malcode overview, viruses, worms |
[ppt] |
Stallings A
Taxonomy of Computer Worms, N. Weaver, V. Paxson,
S. Staniford, and R. Cunningham, the First
ACM Workshop on Rapid Malcode (WORM), 2003. |
Homework 2 out. |
Tue 1/30 |
Internet vulnerability:
denial of service (DoS) Securing the Internet:
intrusion detection systems |
[ppt] |
KPS 23.6 1.
Detecting
SYN Flooding Attacks, H. Wang, D. Zhang, and K. G. Shin, in Proc.
of IEEE INFOCOM, 2002 2. Change-Point Monitoring for Detection of DoS Attacks, H. Wang, D. Zhang, and K. G. Shin, in IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 4, December 2004. |
|
Thu 2/1 |
Securing the Internet:
intrusion detection systems (cont’d), Snort IDS. |
[ppt] |
Stallings http://www.snort.org/docs/ |
|
Tue 2/6 |
Review for Midterm |
|
|
Homework |
Thu 2/8 |
Midterm |
|||
Tue 2/13 |
Midterm grading review /
Project 2 discussion |
|
|
|
Thu 2/15 |
Securing the Internet:
firewalls, VPN |
[ppt] |
1. Handout from 2. Stallings 20.1 |
|
Tue 2/20 |
Securing the Internet: IP
Security |
[ppt] |
KPS Stallings |
Project |
Thu 2/22 |
Software security:
principles Case study: sendmail vs. qmail |
[ppt] |
1. Basic
Principles Of Information Protection, from “The Protection of
Information in Computer Systems”, by J. H. Saltzer
and M. D. Schroeder 2. Qmail handbook, Ch. 1, Introduction
to Qmail |
Homework 3 out. |
Tue 2/27 |
Compiler prime on run-time
program environment. Software security:
buffer/heap overflow and its defense. |
1. Smashing
The Stack For Fun And Profit, Aleph One. 2. Buffer
Overflows: Attacks and Defenses for the Vulnerability of the Decade,
Crispin Cowan, et al. |
|
|
Thu 3/1 |
|
|||
Tue 3/6 |
OS security: overview,
access control, setuid, etc. |
[ppt] |
1. Advanced
Programming in the Unix Environment, Richard. Stevens, Addison-Wesley,
1992. Ch 8.10 Changing User IDs and
Group IDs 2.
Security in Computing,
Charles Pfleeger, Shari 3. Modern Operating Systems,
2nd Ed., A. S. Tanenbaum, Prentice-Hal, 200. |
|
Thu 3/8 |
Review for final |
|
|
Homework Project |
Notes: