Last updated on November 15, 2007

If necessary, consult the legend for the calendar.

Legend

regular session day no session day self and online studying quiz due student presentations exam

Session topics are in bold font

Due dates are in some shade of red

Assignments become available and discussed in the session

 

September
Week # Monday Tuesday Wednesday Thursday Friday
1

3

4

Course overview



5

6

Introduction to Computer Security

Read:

  1. Chapter 1 Anderson, and
  2. Chapter 1 Stamp.

Problems from Stamp to look at: 1,3, 5 from chapter 1.

 

7

Optional student entry anonymous survey due 21:00

2

10

Assignment #1 (threat analysis)
due 21:00

11

Introduction to Cryptography

Read:

  1. Anderson: 5.1-5.2, 5.3
  2. Stamp: Chapter 2 (except 2.3.6 & 2.3.8)

Problems from Stamp chapter 2 to look at: 3, 7, 9, 13, 18, 19, 20.

Optional "get to know" Social Hour, location Mahony & Sons Pub on University Blvd at 19:00

12

13

Symmetric Cryptography

Read:

  1. Anderson: 5.4, 5.5.
  2. Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5

Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.

14

3

17

 

18

  1. Quiz #1
  2. Symmetric Cryptography

Read:

  1. Anderson: 5.4, 5.5.
  2. Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5

Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.

19

20

Asymmetric Cryptography

Read:

  1. Stamp: 4.1-4.3.1, 4.6-4.9
  2. Stamp: 5.1, 5.2, 5.5-5.8
  3. Anderson: 5.6-5.8

Problems from Stamp chapter 4 to look at: 1-10, 12, 13, 20.

Problems from Stamp chapter 5 to look at: 1-6, 8-10, 12-16, 18-23.

21

4

24

Assignment #2 (cryptography)
due 21:00

25

  1. Authentication and Key establishement protocols
  2. Guest Lecture by Ian Blake: Applications of cryptography to online actions and games (slides)

Read:

  1. Anderson: 5.7.2, Chapter 2.
  2. Stamp: 4.4, 9.1-9.4, 9.6, 9.7.

Problems from Stamp chapter 9 to look at: 1-24.

26

 

27

Guest Lecture by Kai Axford, Microsoft: "Identifying Computer Attacks: Tips, Tricks and Tools" (slides)

Note different time and location: 18:45-21:00, downtown.

Register and find location and direction to the lecture venue here.

28

 

 

October
Week # Monday Tuesday Wednesday Thursday Friday
5

1



2

  1. Quiz #2 (on crypto)
  2. Principles of Designing Secure Systems
  3. Demo presentation of last cohort term project

3

4

  1. Authentication
  2. Guest Lecture by Gordon Ross, Virtual Perception Systems: Biometric Authentication (slides)

Read:

  1. Stamp: 7.2-7.8
  2. Anderson: Chapters 3, 13.

Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24.

5

6

8

 

9

  1. Authentication
  2. Case study by Jitu Panesar, Canaccord Capital: Authentication technologies for remote and wireless access for mobile workforce.

16:30 -- deadline for an optional meeting with the instructor to discuss term project proposals

Read:

  1. Stamp: 7.2-7.8
  2. Anderson: Chapter 3.

Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24.

10

Assignment #3 (VPN)
due 21:00

11

Term project proposals presentations

12

Optional anonymous formative feedback Survey I due 21:00

7

15

Term project proposals due 21:00

16

Principles of Designing Secure Systems

Read:

  1. Anderson: Chapters 6, 9, 10, 14.
17

18

  1. Access Control
  2. Case study by Allan Alton, WorksafeBC: Layer 2 Security – No Longer Ignored: Security Possibilities at Layer 2 (slides)

19

 

8

22

 

23

Access Control

Read:

  1. Stamp: sections 8.1-8.4, 8.8-8.10
  2. Anderson: chapters 4, 7, 8.

24

Assignment #4 (passwords)
due 21:00

25

  1. Malicious Logic
  2. Guest Lecture by Robert Slade: 20 Years of Malware Risks (slides)

Read:

  1. Stamp: chapter 11
  2. Anderson: 18.4, 18.5.

Look at the problems from Stamp in chapter 11.

26

9 29

30

  1. Quiz #3 (on authentication, principles of designing secure systems, guest lectures, access control, and malicious logic)
  2. Guest Lecture by Dr. Kirstie Hawkey on Usable security, Part I (slides)
31  

 

November
Week # Monday Tuesday Wednesday Thursday Friday
9  

1

Guest Lecture by Dr. Kasia Muldner on Usable security, Part II (slides)

2
10

5

Assignment #5
due 21:00

6

Developing Secure Software

7

 

8

Security Development Lifecyle

9

 

11

12

13

  1. Quiz #4 (on usable security, developing secure software, and SDL)
  2. Guest lecture by Joost Houwen, Accenture: Current Trends and Technologies in the IT Security Industry

14

Problems 3 & 4 of assignment #5 due 21:00

15

Tutorial on Making Oral Presentations by Dr. Teslenko

16
12

West Coast Security Forum

21

22

Mini-conference

Term projects presented

23

19

Term project reports due 21:00

20

Mini-conference

Term projects presented

13

26

Term project video clips due 21:00

27

Mini-conference

Term projects presented

28

29

  1. Mini-conference
    • Term projects presented
    • Voting held
    • Results announced
    • Prizes awarded
  2. Final examination Q&A
  3. UBC evaluation
  4. Where to go from here

30

 

 

December
Week # Monday Tuesday Wednesday Thursday Friday
14 3

4

Self-assessment of course participation due 22:00

5 6

7

Optional summative feedback survey due 23:55

15 10 11

12

Final Examination 8:30-11:00 in MCLD 228

13 14
16

17

18

19

20

21

17 24

25

26 27 28
18 31    

 

 

 


©2004 Konstantin Beznosov