Topic | Date | Slides | Comments |
Introduction | 27.10 | ||
Introduction to Computer Security | 10.11 | ||
Computer Threats | 17.11 |
The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
The seminar's topics are going to be based on Ross Andreson's book "Security Engineering". After the introduction, each week, students will give a presentation of one of the chapters of the book.
One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.
Please note that you must send your slides in PDF format (as well as their sources) after your presentation to Orr, for the lecture to be counted for.
Date | Student | Topic | Presentation |
24.11 | Oron | Chapter 2 - Usability and Psychology | |
24.11 | Abeer | Chapter 4 - Access Control | |
28.11 | Danielle | Chapter 7 - Economics | |
28.11 | Igal | Chapter 10 - Banking and Bookkeeping | |
1.12 | Lior | Chapter 8 - Multilevel Security | |
1.12 | Tal | Chapter 9 - Multilateral Security | |
8.12 | Ben | Chapter 15 - Biometrics | |
2.1 (Thu.!) | Hamada | Chapter 13 - Nuclear Command & Control | |
2.1 (Thu.!) | Mohsen | Chapter 19 - Electronic and Information Warfare | |
5.1 | Danny | Chapter 16 - Physical Tamper Resistance | |
12.1 | Victor | Chapter 12 - Monitoring and Metering | |
12.1 | Rose | Chapter 25 - Managing the Development of Secure Systems | |
19.1 | Marawan | Chapter 24 - Terror, Justice and Freedom | |
30.1 | Azmi | Chapter 26 - System Evaluation and Assurance | |
30.1 | Firas | Chapter 20 - Telecom System Security |
Note that this schedule is not final, and may be changed!