Unit | Lecture number | Lecture date | Textbook sections | Slides |
1 |
Lecture 1
| 11 September
| 1.1 – 1.11
|
(odp)
(pdf)
(ppt)
|
2 |
Lecture 2
| 13 September
| 3.1, 3.2
|
(odp)
(pdf)
(ppt)
|
Mandatory reading before class: Smashing The Stack For Fun And Profit |
Optional reading: On the Evolution of Buffer Overflows |
Optional reading: A Taxonomy of Computer Program Security Flaws, with Examples |
Lecture 3
| 18 September
| 3.3
|
(odp)
(pdf)
(ppt)
|
Optional reading: The Spread of the Sapphire/Slammer Worm |
Lecture 4
| 20 September
| 3.4
|
(odp)
(pdf)
(ppt)
|
Mandatory reading: Reflections on Trusting Trust |
Optional reading: Linux Kernel "Back Door" Attempt |
Optional reading: Salami attacks |
Optional reading: Two-factor Man-in-the-Middle attacks: ABN Ambro incident; Citibank incident |
Lecture 5
| 25 September
| 3.5
|
(odp)
(pdf)
(ppt)
|
3 |
Lecture 6
| 27 September
| 4.1, 4.2, 4.3, 4.4
|
(odp)
(pdf)
(ppt)
|
Lecture 7
| 2 October
| 4.5
|
(odp)
(pdf)
(ppt)
|
Optional reading: MySpace Passwords Aren't So Dumb |
Optional reading: Secure Passwords Keep You Safer |
Lecture 8
| 4 October
| 5.1, 5.2
|
(odp)
(pdf)
(ppt)
|
Lecture 9
| 9 October
| 5.3, 5.4
|
(odp)
(pdf)
(ppt)
|
Mandatory reading before class: The Protection of Information in Computer Systems, section I.A. (only section I.A. is mandatory) |
Optional reading: The Security Principles of Saltzer and Schroeder, illlustrated with scenes from Star Wars |
4 |
Lecture 10
| 11 October
| 5.5, 7.1
|
(odp)
(pdf)
(ppt)
|
Lecture 11
| 16 October
| 7.2
|
(odp)
(pdf)
(ppt)
|
Lecture 12
| 18 October
| 7.3, 7.4
|
(odp)
(pdf)
(ppt)
|
5 |
Lecture 13
| 23 October
| 2.4
|
(odp)
(pdf)
(ppt)
|
Lecture 14
| 25 October
| 2.7
|
(odp)
(pdf)
(ppt)
|
Lecture 15
| 30 October
| 2.8, 7.3
|
(odp)
(pdf)
(ppt)
|
Lecture 16
| 1 November
| 7.3, 10
|
(odp)
(pdf)
(ppt)
|
Optional reading: Cracking WEP in 60 seconds |
Optional reading: Intercepting Mobile Communications: The Insecurity of 802.11 |
Lecture 17
| 6 November
| 7.3, 10
|
(odp)
(pdf)
(ppt)
|
Optional reading: The Tor Project |
Lecture 18
| 8 November
| 7.3, 10
|
(odp)
(pdf)
(ppt)
|
Optional reading: Mixminion |
Optional reading: Off-the-Record Messaging |
6 |
Lecture 19
| 13 November
| 6.1 – 6.4
|
(odp)
(pdf)
(ppt)
|
Lecture 20
| 15 November
| 6.5 – 6.7
|
(odp)
(pdf)
(ppt)
|
Lecture 21
| 20 November
| 6.8
|
(odp)
(pdf)
(ppt)
|
Optional reading: Attrition.org Data Loss Archive and Database |
7 |
Lecture 22
| 22 November
| 8.1, 8.2, 8.3
|
(odp)
(pdf)
(ppt)
|
Optional reading: UW's continuity plan in case of a pandemic |
Lecture 23
| 27 November
| 8.4, 11.1, 11.2
|
(odp)
(pdf)
(ppt)
|
Optional reading: The Computer Centre Incident at Concordia |
Optional reading: Visual Cryptography (example) |
Lecture 24
| 29 November
| 11.4, 11.5, 11.6
|
(odp)
(pdf)
(ppt)
|
Optional viewing: A Fair(y) Use Tale |
Optional reading: Bruce Schneier on Full Disclosure |
Optional reading: Codes of ethics:
ACM
IEEE
CIPS
|