September |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
1 |
1 |
2
- Course overview
- Introduction to Computer Security
Read:
- Chapter 1 Anderson, and
- Chapter 1 Stamp.
Problems from Stamp to look at: 1,3, 5 from chapter 1.
|
3 |
4
- Demo presentation of last cohort term project
- Introduction to Computer Security
Read:
- Chapter 1 Anderson, and
- Chapter 1 Stamp.
Problems from Stamp to look at: 1,3, 5 from chapter 1.
Optional "get to know" Social Hour, location Mahony & Sons Pub on University Blvd at 19:15 |
5
|
2 |
8
Assignment #1 (threat analysis)
due 21:00 |
9
Introduction to Cryptography
Read:
- Anderson: 5.1-5.2, 5.3
- Stamp: Chapter 2 (except 2.3.6 & 2.3.8)
Problems from Stamp chapter 2 to look at: 3, 7, 9, 13, 18, 19, 20.
|
10 |
11
Symmetric Cryptography
Read:
- Anderson: 5.1-5.2, 5.3
- Stamp: 3.1-3.2.1, 3.3.1
Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.
|
12 |
3 |
15
|
16
- Quiz #1 (on all but last lecture)
- Symmetric Cryptography
Read:
- Anderson: 5.4.
- Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5
Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33. |
17 |
18
Symmetric Cryptography
Read:
- Anderson: 5.5, 5.6.
- Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5
Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.
|
19 |
4 |
22
Assignment #2 (cryptography)
due 21:00 |
23
Asymmetric Cryptography
Read:
- Stamp: 4.1-4.3.1, 4.6-4.9
- Stamp: 5.1, 5.2, 5.5-5.8
- Anderson: 5.3.4, 5.3.5, 5.7, 5.8
Problems from Stamp chapter 4 to look at: 1-10, 12, 13, 20.
Problems from Stamp chapter 5 to look at: 1-6, 8-10, 12-16, 18-23. |
24
|
25
Authentication and Key establishement protocols
Read:
- Anderson: 5.7.1, 5.7.2, Chapter 3.
- Stamp: 4.4, 9.1-9.4, 9.6, 9.7.
Problems from Stamp chapter 9 to look at: 1-24.
|
26
|
October |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
5 |
29
|
30
- Quiz #2 (on symmetric and asymmetric crypto)
|
1 |
2
- Principles of Designing Secure Systems
- Case study: WorkSafeBC’s Wireless LAN Implementation – with a focus on security
Read:
- Stamp: 7.2-7.8
- Anderson: Chapters 3, 13.
Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24. |
3 |
6 |
6
|
7
Authentication
deadline for an optional meeting with the instructor to discuss term project proposals
Read:
- Stamp: 7.2-7.8
- Anderson: Chapter 3.
Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24. |
8
Assignment #3
due 21:00 |
9
Access Control
Read:
- Anderson: Chapters 6, 9, 10, 14.
|
10
|
7 |
13
Optional anonymous formative feedback Survey I due 21:00 |
14
Term project proposals presentations |
15
Term project proposals due 21:00 |
16
Software Security |
17
|
8 |
20
Assignment #4 (passwords)
due 21:00 |
21
- Software Security
Read:
- Stamp: sections 8.1-8.4, 8.8-8.10
- Anderson: chapters 4, 7, 8.
|
22
|
23
- Software Security
- Optional: Case study
- Guest Lecture on Software Forensics
Read:
- Stamp: chapter 11
- Anderson: 18.4, 18.5.
Look at the problems from Stamp in chapter 11. |
24 |
9 |
27 |
28
- Quiz #3
- Guest lecture on web application security by Rui Pereira, WaveFront Consulting Group
|
29 |
30
Guest Lecture by Dr. Kirstie Hawkey on Usable security |
31 |
December |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
14 |
|
3 |
4 |
5
8:30 AM - 11:00 AM Final examination |
1
Term project reports due 21:00 |
2
Self-assessment of course participation due 22:00 |
15 |
8 |
9 |
10 |
11 |
12
Optional summative feedback survey due 23:55 |
16 |
15 |
16 |
17 |
18 |
19 |
17 |
23 |
23 |
24 |
25 |
26 |
18 |
30 |
31 |
|
|
|
|