September |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
1 |
3 |
4
Course overview
|
5 |
6
Introduction to Computer Security
Read:
- Chapter 1 Anderson, and
- Chapter 1 Stamp.
Problems from Stamp to look at: 1,3, 5 from chapter 1.
|
7
Optional student entry anonymous survey due 21:00 |
2 |
10
Assignment #1 (threat analysis)
due 21:00 |
11
Introduction to Cryptography
Read:
- Anderson: 5.1-5.2, 5.3
- Stamp: Chapter 2 (except 2.3.6 & 2.3.8)
Problems from Stamp chapter 2 to look at: 3, 7, 9, 13, 18, 19, 20.
Optional "get to know" Social Hour, location Mahony & Sons Pub on University Blvd at 19:00 |
12 |
13
Symmetric Cryptography
Read:
- Anderson: 5.4, 5.5.
- Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5
Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.
|
14 |
3 |
17
|
18
- Quiz #1
- Symmetric Cryptography
Read:
- Anderson: 5.4, 5.5.
- Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5
Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33. |
19 |
20
Asymmetric Cryptography
Read:
- Stamp: 4.1-4.3.1, 4.6-4.9
- Stamp: 5.1, 5.2, 5.5-5.8
- Anderson: 5.6-5.8
Problems from Stamp chapter 4 to look at: 1-10, 12, 13, 20.
Problems from Stamp chapter 5 to look at: 1-6, 8-10, 12-16, 18-23. |
21 |
4 |
24
Assignment #2 (cryptography)
due 21:00 |
25
- Authentication and Key establishement protocols
- Guest Lecture by Ian Blake: Applications of cryptography to online actions and games (slides)
Read:
- Anderson: 5.7.2, Chapter 2.
- Stamp: 4.4, 9.1-9.4, 9.6, 9.7.
Problems from Stamp chapter 9 to look at: 1-24. |
26
|
27
Guest Lecture by Kai Axford, Microsoft: "Identifying Computer Attacks: Tips, Tricks and Tools" (slides)
Note different time and location: 18:45-21:00, downtown.
Register and find location and direction to the lecture venue here. |
28
|
October |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
5 |
1
|
2
- Quiz #2 (on crypto)
- Principles of Designing Secure Systems
- Demo presentation of last cohort term project
|
3 |
4
- Authentication
- Guest Lecture by Gordon Ross, Virtual Perception Systems: Biometric Authentication (slides)
Read:
- Stamp: 7.2-7.8
- Anderson: Chapters 3, 13.
Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24. |
5 |
6 |
8
|
9
- Authentication
- Case study by Jitu Panesar, Canaccord Capital: Authentication technologies for remote and wireless access for mobile workforce.
16:30 -- deadline for an optional meeting with the instructor to discuss term project proposals
Read:
- Stamp: 7.2-7.8
- Anderson: Chapter 3.
Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24. |
10
Assignment #3 (VPN)
due 21:00 |
11
Term project proposals presentations |
12
Optional anonymous formative feedback Survey I due 21:00 |
7 |
15
Term project proposals due 21:00 |
16
Principles of Designing Secure Systems
Read:
- Anderson: Chapters 6, 9, 10, 14.
|
17 |
18
- Access Control
- Case study by Allan Alton, WorksafeBC: Layer 2 Security – No Longer Ignored: Security Possibilities at Layer 2 (slides)
|
19
|
8 |
22
|
23
Access Control
Read:
- Stamp: sections 8.1-8.4, 8.8-8.10
- Anderson: chapters 4, 7, 8.
|
24
Assignment #4 (passwords)
due 21:00 |
25
- Malicious Logic
- Guest Lecture by Robert Slade: 20 Years of Malware Risks (slides)
Read:
- Stamp: chapter 11
- Anderson: 18.4, 18.5.
Look at the problems from Stamp in chapter 11. |
26 |
9 |
29 |
30
- Quiz #3 (on authentication, principles of designing secure systems, guest lectures, access control, and malicious logic)
- Guest Lecture by Dr. Kirstie Hawkey on Usable security, Part I (slides)
|
31 |
|
December |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
14 |
3 |
4
Self-assessment of course participation due 22:00 |
5 |
6 |
7
Optional summative feedback survey due 23:55 |
15 |
10 |
11 |
12
Final Examination 8:30-11:00 in MCLD 228 |
13 |
14 |
16 |
17 |
18 |
19 |
20 |
21 |
17 |
24 |
25 |
26 |
27 |
28 |
18 |
31 |
|
|
|
|
|