1 / 9

463.0.1 Course Plan

463.0.1 Course Plan. UIUC CS463 Computer Security. Studying Security at UIUC. CS461 Information Assurance Fall and Spring CS460 Security Lab Spring CS463 Computer Security Fall and Spring CS563 Advanced Computer Security Fall Math 595 / ECE 559 / CS498 Cryptography Fall

nia
Download Presentation

463.0.1 Course Plan

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 463.0.1 Course Plan UIUC CS463 Computer Security

  2. Studying Security at UIUC • CS461 Information Assurance • Fall and Spring • CS460 Security Lab • Spring • CS463 Computer Security • Fall and Spring • CS563 Advanced Computer Security • Fall • Math 595 / ECE 559 / CS498 Cryptography • Fall • See http://www.iti.uiuc.edu/roadmaps/security-roadmap.html for links and updates This Course!

  3. Summary • This is a course for graduate students and advanced undergraduates wanting to learn security topics necessary to understand on-going research in security. • It assumes a basic knowledge of security. • Test yourself: CIA guarantees, access control matrices, public key cryptography, SSL protocol, dictionary attack.

  4. Teaching Assistant: Fariba Khan Course web page http://www.cs.uiuc.edu/class/sp07/cs498cag Course textbook: Matt Bishop, Computer Security Art and Science Assessment Midterm 25% Project 35% 25% design and coding 10% analysis Final Exam 40% Administrative Matters

  5. Getting into the Groove • Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Clifford Stoll. Pocket Books 2000. • Crypto : How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age. Steven Levy. Viking Press 2001. • Cryptonomicon. Neal Stephenson. Harperperennial Library 2000. • Secrets and Lies, Bruce Schneier, 2000.

  6. Primary Topics • Foundations (3) • Policies (7) • Access Control Mechanisms (15) • Database Security • Key Management (10) • Representing Identity (14) • Noninterference (8) • Information Flow (16)

  7. Primary Topics Continued • Confinement (17) • Assurance (19) • Formal Methods (20) • Intrusion Detection (25) • Program Security (29)

  8. Schedule • No class on Friday Jan 18 • Begin lectures with introduction on Wednesday Jan 24 • Project concepts and expectations presented on Jan 26 • Begin primary topics on Wednesday 31 Jan with Foundations • One or two 60 minute lectures on each primary topic, followed by discussion

  9. Important Dates • First Lecture: Jan 24 • Midterm: Mar 16 (Friday before break) • Project Presentations: Apr 18 • Project Reviews: May 2 (last day of class) • Final Exam: May 8 from 8 to 11AM

More Related