Topic | Date | Slides | Comments |
Introduction | 9.3 | ||
Computer Threats | 11.3,23.1 |
The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
The seminar's topics are going to be based on Ross Andresson's book ``Security Engineering''. After the introduction, each week, students will give a presentation of one of the chapters of the book.
One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.
Please note that you must send slides in PDF format after your presentation to Orr, for the lecture to be counted for.
Date | Student | Topic | Presentation |
6.4 | Amir | Usability and Psychology | |
6.4 | Dean | Multilevel Security | |
27.4 | Alex | Biometrics | |
27.4 | Nadav | Emission Security | PDF Defcon presentation |
4.5 | David | Monitoring and Metering | |
4.5 | Nitay | Telecom System Security | |
11.5 | Galit | Network Attack and Defense | |
18.5 | Veronica | Banking and Bookkeeping | |
18.5 | Barak | Nuclear Command and Control | |
25.5 | Shai | API Security | |
25.5 | Ziv | Physical Tamper Resistance | |
8.6 | Igal | Electronic and Information Warfare | |
8.6 | Muhammad | The Bleeding Edge | |
11.6 | Lior | Copyright and DRM |
Note that this schedule is not final, and may be changed!