General Information
Instructor
Teaching Assistant
Overview
The objectives of this course consist of developing a solid understanding of fundamental principles of the security field and building knowledge of tools and mechanisms to safeguard a wide range of software and computing systems. It is intended for upper-level undergraduate and graduate students, and a tentative list of the covered topics is: cryptographic background and tools; access control; authentication; software security, malware; Internet security protocols and standards (SSL/TLS, IPsec, secure email); intrusion detection and intrusion prevention systems (firewalls); database security; privacy; identity management; security management and risk assessment; legal and ethical aspects (cybercrime, intellectual property)
Downloads: Course Syllabus
Tentative Schedule
Date | Topic | Notes |
---|---|---|
Week-1 Class-1 1/30 | Overview Notes Video | 1. Read CSE and UB academic integrity policies and procedures and finish the quiz on UBLearns. 2. Read Chapter 1. |
Week-1 Class-2 2/1 | Symmetric Encryption I Notes Video | Read Sections 2.1 and 20.2 |
Week-2 Class-1 2/6 | Symmetric Encryption II Notes | Read Sections 20.3 and 20.5 |
Week-2 Class-2 2/8 | Data Integrity and Hash Functions Notes | Read Sections 2.2, 21.1, and 21.2 |
Week-3 Class-1 2/13 | Data Integrity and Hash Functions Notes | |
Week-3 Class-2 2/15 | Public-Key Cryptography Notes | Sections 2.3, 2.4, 21.4, and 21.5 |
Week-4 Class-1 2/20 | Certificates and Randomness Notes | Read Sections 2.4 and 2.5 |
Week-4 Class-2 2/22 | Authentication Notes | Read Chapter 3 |
Week-5 Class-1 2/27 | Access Control Notes | The instructor will be out of town on the 27th. Instead, the class will be delivered on-line on the 24th 9PM. Students can attend the online session though it is not required. Recording will be provided thereafter. |
Week-5 Class-2 3/1 | Access Control II Notes | |
Week-6 Class-1 3/6 | Database Security Notes | |
Week-6 Class-2 3/8 | Key Establishment and Applications Notes | The instructor will be out of town on the 8th. Instead, the class will be delivered on-line on the 10th 9PM. Students can attend the online session though it is not required. Recording will be provided thereafter. |
Week-7 Class-1 3/13 | Public-Key Infrastructure Notes | |
Week-7 Class-2 3/15 | *** Midterm Exam *** Midterm-2 | |
Week-8 Class-1 3/20 | === Spring Recess No class === | |
Week-8 Class-2 3/22 | === Spring Recess No class === | |
Week-9 Class-1 3/27 | Operating System Security Notes | |
Week-9 Class-2 3/29 | Operating System Security II Notes | |
Week-10 Class-1 4/3 | Software Security Notes | |
Week-10 Class-2 4/5 | Software Security II Notes | |
Week-11 Class-1 4/10 | Software Security III Notes | |
Week-11 Class-2 4/12 | Building Secure Software Notes | |
Week-12 Class-1 4/17 | Malware Notes | |
Week-12 Class-2 4/18 | Network Attacks Notes | |
Week-13 Class-1 4/24 | Intrusion Detection Notes | |
Week-13 Class-2 4/26 | Intrusion Prevention Notes | |
Week-14 Class-1 5/1 | Security Management Notes | |
Week-14 Class-2 5/3 | Anonymous Communication Notes | |
Week-15 Class-1 5/8 | Privacy Enhancing Technologies Notes | |
Week-15 Class-2 5/10 | Beyond 410/565 | |
Final Exam 5/19 3:30PM-6:30PM |
Resources
Required textbook:- William Stallings and Lawrie Brown, Computer Security: Principles and Practice, 4th edition, Pearson, 2017.
- Charles Pfleeger and Shari Pfleeger, Security in Computing.
- William Stallings, Cryptography and Network Security, Principles and Practice.
- Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World.
- Edward Skoudis and Tom Liston, Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.
- Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems.