Computer Security Seminar (203.3365) - Spring 2015


Spring 2015 General Information

Syllabus:

Course's staff

Class hours

Grading policy

You must attend at least 10 meetings to pass the course.

Prerequisites and Requirements


Announcements


Lecture slides

TopicDateSlidesComments
Introduction15.3PDF 
Introduction to Computer Security25.3PDF 
Computer Threats25.3PDF 

The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.


Related Links


The Topics for the Seminar

The seminar's topics are going to be based on Ross Andresson's book ``Security Engineering''. After the introduction, each week, students will give a presentation of one of the chapters of the book.
Chapter Topic
2 Usability and Psychology
4 Access Control
8 Multilevel Security
9 Multilateral Security
10 Banking and Bookkeeping
12 Monitoring and Metering
13 Nuclear Command and Control
15 Biometrics
16 Physical Tamper Resistance
17 Emission Security
18 API Security
19 Electronic and Information Warfare
20 Telecom System Security
21 Network Attack and Defense
22 Copyright and DRM
23 The Bleeding Edge
24 Terror, Justice and Freedom
26 System Evaluation and Assurance

One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.

Please note that you must send slides in PDF format after your presentation to Orr, for the lecture to be counted for.


The Seminar's Schedule

Date Student Topic Presentation
19.4 Moria Chapter 2 - Usability and Psychology PDF
19.4 Mostafa Chapter 4 - Access Control PDF
26.4 Amir Chapter 8 - Multilevel Security PDF
26.4 Omer P. Chapter 9 - Multilateral Security PDF
3.5 Aviv Chapter 15 - Biometrics PDF
3.5 David Chapter 17 - Emission Security PDF Beethoven for screens
10.5 Sharon Chapter 24 - Terror, Justice and Freedom PDF
10.5 Anton Chapter 19 - Electronic and Information Warfare PDF
31.5 Rami Chapter 20 - Telecom System Security PDF
31.5 Adam Chapter 26 - System Evaluation and Assurance PDF
7.6 Roee Chapter 21 - Network Attack and Defense PDF
7.6 Tsufit Chapter 13 - Nuclear Command and Control PDF
14.6 Omer G. Chapter 23 - The Bleeding Edge PDF

Note that this schedule is not final, and may be changed!