Computer Security, Spring 2006

Part of the 22C:169, Computer Security Collection
by Douglas W. Jones
THE UNIVERSITY OF IOWA Department of Computer Science

Lectures are at 9:30 Tuesday-Thursday in Room 2217 Seamens Center. Note: This course outline is very tentative and subject to change

Tues Jan 17 Chapter 1 -- Attacks and Attackers
Thur Jan 19 Unix summary
Tues Jan 24 More Unix kernel commands
Thur Jan 26 Unix puzzles
Tues Jan 31 Sections 1.4.3 to 2.2
Thur Feb 2 Sections 2.2 to
Tues Feb 7 Sections 3.1 to 3.5 Authentication
Thur Feb 9 Sections 3.6 to 3.9
Tues Feb 14 Sections 4.0 to 4.5 Access Controls
Thur Feb 16 Sections 4.6 to --- Scope rules, ACLs, C-Lists
Tues Feb 21 Sections --- to 4.8 Amplification and Gate Crossing
Thur Feb 23 Sections 5.0 to 5.3 Reference Monitors
Tues Feb 28 Sections 5.4 to --- The role of hardware
Thur Mar 2 Sections --- to 5.6 Strong typing and software
Tues Mar 7 Chapters 6 and 7
Thur Mar 9 Review and Midterm
Tues Mar 21 Discuss midterm solutions
Thur Mar 23 RFID Viruses
Tues Mar 28 Security Assessment of AccuBasic
Thurs Mar 30 Chapters 8 to 10
Tues Apr 4 Sections 11.0 to 11.4 not just cryptography
Thurs Apr 6 Sections 11.5 to 11.9 cryptography
Tues Apr 11 The story of Patent 6149522
Thurs Apr 13 No class -- Passover
Tues Apr 18 Chapter 12
Thurs Apr 20 Chapter 13
Tues Apr 25 Amoeba
Thurs Apr 27 Steganography
Tues May 2 Chapter 14 -- software security
Thurs May 4 Analysis of an Electronic Voting System and Reflections on Trusting Trust
Thurs May 11 FINAL EXAM 9:45 AM