Last updated on December 4, 2009

If necessary, consult the legend for the calendar.

Legend

regular session day no session day self and online studying quiz due student presentations exam

Session topics are in bold font

Due dates are in some shade of red

Assignments become available and discussed in the session

 

September
Week # Monday Tuesday Wednesday Thursday Friday
1 7

8

UBC-wide orientation.
No classes.

9

10

No class.

11
2

14

15

  1. Course overview
  2. Introduction to Computer Security

Read:

  1. Chapter 1 Anderson, and
  2. Chapter 1 Stamp.

Problems from Stamp to look at: 1,3, 5 from chapter 1.



16

17

Guest lecture "Introduction to Cryptography" by Cary Meltzer

Read:

  1. Anderson: 5.1-5.2, 5.3
  2. Stamp: Chapter 2 (except 2.3.6 & 2.3.8)

Problems from Stamp chapter 2 to look at: 3, 7, 9, 13, 18, 19, 20.

18

3

21

Assignment #1 (Risk Analysis)
due 21:00

22

Symmetric Cryptography

Read:

  1. Anderson: 5.1-5.2, 5.3
  2. Stamp: 3.1-3.2.1, 3.3.1

Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.

23

24

Symmetric Cryptography

Read:

  1. Anderson: 5.4.
  2. Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5

Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.

link to AES demos in Flash

 

25

4

28

 

29

  1. Demo presentation of last cohort term project
  2. Quiz #1 (on all lectures)
30

 

 

October
Week # Monday Tuesday Wednesday Thursday Friday
4  

1

Asymmetric Cryptography

Read:

  1. Stamp: 4.1-4.3.1, 4.6-4.9
  2. Stamp: 5.1, 5.2, 5.5-5.8
  3. Anderson: 5.3.4, 5.3.5, 5.7, 5.8

Problems from Stamp chapter 4 to look at: 1-10, 12, 13, 20.

Problems from Stamp chapter 5 to look at: 1-6, 8-10, 12-16, 18-23.

2
5

5

Assignment #2 (crypto)
due 21:00

6

Authentication and Key establishment protocols

Read:

  1. Anderson: 5.7.1, 5.7.2, Chapter 3.
  2. Stamp: 4.4, 9.1-9.4, 9.6, 9.7.

Problems from Stamp chapter 9 to look at: 1-24.

7

8

  1. Principles of Designing Secure Systems

Read:

  1. Stamp: 7.2-7.8
  2. Anderson: Chapters 3, 13.

Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24.

9
6

12

Thanksgiving Day

13

  1. Quiz #2 (on all lectures since previous quiz)
  2. Authentication

Read:

  1. Stamp: 7.2-7.8
  2. Anderson: Chapter 3.
  3. Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24.

14

15

Authentication

deadline for an optional meeting with the instructor to discuss term project proposals

Read:

  1. Stamp: 7.2-7.8
  2. Anderson: Chapter 3.

Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24.

16

7

19

 

Assignment #3 (VPN)
due 21:00

20

  1. Access Control
  2. Guest lecture on security risks in social networking/social
    media/Web 2.0
    by Rob Lade

Read:

  1. Anderson: chapters 4, 8, 9, 10.
  2. Stamp: sections 8.1-8.4, 8.8-8.10

21

22

Term project proposals presentations

23

 

8

26

 

27

  1. Quiz #3
  2. Access Control
  3. Guest lecture: "A standards-based approach to IT security policy development" by Eva Kipper, HP.

Read:

  1. Anderson: chapters 4, 8, 9, 10.
  2. Stamp: sections 8.1-8.4, 8.8-8.10

28

Term project proposals due 21:00

29

Malicious Software

Read:

  1. Stamp, Chapter 11
  2. Anderson Chapter 23

Look at the problems from Stamp in chapter 11.

30

 

 

November
Week # Monday Tuesday Wednesday Thursday Friday
9

2

Assignment #4 (passwords)
due 21:00

3

  1. Software Security
  2. Optional: Case study

Read:

  1. Stamp: chapter 12
  2. Anderson: 18.4, 18.5, Chapters 25 & 26

 

4

 

5

Guest lecture on Web application security by Rui Pereira, WaveFront Consulting Group

6

10 9

10

  1. Quiz #4
  2. Guest Lecture on Usable security by Dr. Kirstie Hawkey

11

Remembrance Day, UBC closed

12

Guest Lecture on Usable security by Dr. Kirstie Hawkey

13
11

16

Assignment #5 (WebGoat)
due 21:00

17

  1. Social and economic aspects of computer security
  2. Tutorial on Making Oral Technical Presentations

Read: Anderson Chapters 7, 24, 26

18

19

  1. Case study by Stephen Pedersen, Security Development, Telus
  2. Case study on BCTC’s Security Planning for the 2010 Games by Brian Martin, Manager Security & Business Continuity, BC Transmission Corporation

20

12

23

Term project video clips due 21:00

24

Mini-conference

Term projects presented


25

26

Mini-conference

Term projects presented

27
13

30

 

 

 

 

December
Week # Monday Tuesday Wednesday Thursday Friday
13

 

 

1

Mini-conference

Term projects presented

2

3

  1. Mini-conference
  2. Final examination Q&A
  3. Where to go from here
4
14

7

Term project reports due 21:00

8

Self-assessment of course participation due 22:00

9

10

11

15

14

Final Exam 3:30-6 PM

15 16 17

18

 

16 21 22

23

24

25

 

 


© 2003-2008 Konstantin Beznosov