September |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
1 |
7 |
8
UBC-wide orientation.
No classes. |
9 |
10
No class. |
11 |
2 |
14 |
15
- Course overview
- Introduction to Computer Security
Read:
- Chapter 1 Anderson, and
- Chapter 1 Stamp.
Problems from Stamp to look at: 1,3, 5 from chapter 1.
|
16 |
17
Guest lecture "Introduction to Cryptography" by Cary Meltzer
Read:
- Anderson: 5.1-5.2, 5.3
- Stamp: Chapter 2 (except 2.3.6 & 2.3.8)
Problems from Stamp chapter 2 to look at: 3, 7, 9, 13, 18, 19, 20. |
18 |
3 |
21
Assignment #1 (Risk Analysis)
due 21:00 |
22
Symmetric Cryptography
Read:
- Anderson: 5.1-5.2, 5.3
- Stamp: 3.1-3.2.1, 3.3.1
Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33. |
23 |
24
Symmetric Cryptography
Read:
- Anderson: 5.4.
- Stamp: 3.1-3.2.1, 3.3.1, 3.3.4, 3.3.7-3.5
Problems from Stamp chapter 3 to look at: 4-8, 10-12, 15-22, 24, 25, 27, 28, 30, 31-33.
link to AES demos in Flash
|
25 |
4 |
28
|
29
- Demo presentation of last cohort term project
- Quiz #1 (on all lectures)
|
30 |
|
October |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
4 |
|
1
Asymmetric Cryptography
Read:
- Stamp: 4.1-4.3.1, 4.6-4.9
- Stamp: 5.1, 5.2, 5.5-5.8
- Anderson: 5.3.4, 5.3.5, 5.7, 5.8
Problems from Stamp chapter 4 to look at: 1-10, 12, 13, 20.
Problems from Stamp chapter 5 to look at: 1-6, 8-10, 12-16, 18-23. |
2 |
5 |
5
Assignment #2 (crypto)
due 21:00 |
6
Authentication and Key establishment protocols
Read:
- Anderson: 5.7.1, 5.7.2, Chapter 3.
- Stamp: 4.4, 9.1-9.4, 9.6, 9.7.
Problems from Stamp chapter 9 to look at: 1-24. |
7 |
8
- Principles of Designing Secure Systems
Read:
- Stamp: 7.2-7.8
- Anderson: Chapters 3, 13.
Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24. |
9 |
6 |
12
Thanksgiving Day
|
13
- Quiz #2 (on all lectures since previous quiz)
- Authentication
Read:
- Stamp: 7.2-7.8
- Anderson: Chapter 3.
- Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24.
|
14 |
15
Authentication
deadline for an optional meeting with the instructor to discuss term project proposals
Read:
- Stamp: 7.2-7.8
- Anderson: Chapter 3.
Problems from Stamp chapter 7 to look at: 1, 2, 4-11, 13-15, 17-19, 21-24. |
16 |
7 |
19
Assignment #3 (VPN)
due 21:00 |
20
- Access Control
- Guest lecture on security risks in social networking/social
media/Web 2.0 by Rob Lade
Read:
- Anderson: chapters 4, 8, 9, 10.
- Stamp: sections 8.1-8.4, 8.8-8.10
|
21 |
22
Term project proposals presentations |
23
|
8 |
26
|
27
- Quiz #3
- Access Control
- Guest lecture: "A standards-based approach to IT security policy development" by Eva Kipper, HP.
Read:
- Anderson: chapters 4, 8, 9, 10.
- Stamp: sections 8.1-8.4, 8.8-8.10
|
28
Term project proposals due 21:00 |
29
Malicious Software
Read:
- Stamp, Chapter 11
- Anderson Chapter 23
Look at the problems from Stamp in chapter 11. |
30
|
November |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
9 |
2
Assignment #4 (passwords)
due 21:00 |
3
- Software Security
- Optional: Case study
Read:
- Stamp: chapter 12
- Anderson: 18.4, 18.5, Chapters 25 & 26
|
4
|
5
Guest lecture on Web application security by Rui Pereira, WaveFront Consulting Group |
6 |
10 |
9 |
10
- Quiz #4
- Guest Lecture on Usable security by Dr. Kirstie Hawkey
|
11
Remembrance Day, UBC closed |
12
Guest Lecture on Usable security by Dr. Kirstie Hawkey |
13 |
11 |
16
Assignment #5 (WebGoat)
due 21:00 |
17
- Social and economic aspects of computer security
- Tutorial on Making Oral Technical Presentations
Read: Anderson Chapters 7, 24, 26 |
18 |
19
- Case study by Stephen Pedersen, Security Development, Telus
- Case study on BCTC’s Security Planning for the 2010 Games by Brian Martin, Manager Security & Business Continuity, BC Transmission Corporation
|
20 |
12 |
23
Term project video clips due 21:00 |
24
Mini-conference
Term projects presented
|
25 |
26
Mini-conference
Term projects presented |
27 |
13 |
30
|
|
|