Information for Fall 10 CS136 --- Computer Security

This page contains pointers to Postscript versions of slides used in CS136, Computer Security. It also contains pointers to non-required reading and other material related to the class.

This page is organized by the weeks of the quarter in which lectures were given. The weeks are in inverse order, on the assumption you will most often be looking for the most recent week.

This class will be taught by Peter Reiher. The textbook is Computer Security: Art and Science, by Matt Bishop. Assigned readings are from this book, unless otherwise indicated. Dr. Bishop has also published a second textbook that contains selected sections of this book, with a similar title. I can't guarantee that all material assigned will actually be in this other book, and it will definitely be at different pages if it's there at all.

I will be lecturing on these subjects during the class.

TA and Labs

The TA for the course is Peter Peterson -- pahp@cs.ucla.edu. The labs for this course will consist of 5 hands-on, practical and exploratory projects covering security-related topics, plus a small introduction to the lab software. Office hour and discussion section information will be determined following the first recitation section and posted here.

Instructions for accessing the homework will be given out via email following the first class section and will be discussed during the first recitation section. The lab manual and all necessary materials for the labs are located here (login information for these resources will be provided on Thursday via email).

Participation in NSF Study

As indicated in class, Dr. Reiher is running an NSF-sponsored research study on the effectiveness of using practical exercises as a teaching tool for computer security classes. He has asked students taking the class this quarter if they want to participate in this study. Participation is strictly voluntary and has no effect on one's grade. Details on the study and a copy of the consent form volunteers should sign and return are available here.

Sample Final Exam

Here is a sample final exam for the course. This exam was given in a previous year, so the material covered might be slightly different, but almost all of the questions should be answerable from material I lectured on or assigned as readings.

Week 10 (November 30 - December 3)

Thursday, December 2

Slides

Lecture 18

Assigned readings:

Textbook: Chapter 21 (pages 571 -608)

Tuesday, November 30

Slides

Lecture 17

Assigned readings:

No readings are assigned for Tuesday.

Week 9 (November 17 - November 23)

Tuesday, November 23

Slides

Lecture 16

Assigned readings:

No readings assigned for Tuesday.

Thursday, November 18

Slides

Lecture 15

Assigned readings:

Textbook: Chapter 22 (pages 613-641)

Week 8 (November 10 - November 16)

Tuesday, November 16

Slides

Lecture 14

Assigned readings:

Textbook: Chapter 25 (pages 723-767)

Web link (not required reading):

SANS' frequently asked question page on intrusion detection contains links to a lot of useful information, without trying to sell you on a particular product.

Thursday, November 11

Veterans Day, no class.

Week 7 (November 3 - November 9)

Tuesday, November 9

Slides

Lecture 13

Assigned readings:

No new readings in the book are assigned for today.

Web links:

The home page for the Honeynet project. You are not required to read or investigate this page, but if you find the concept of honeypots and honeynets particularly interesting, this is a good place to learn more.

Thursday, November 4

Slides

Lecture 12

Assigned readings:

No new readings assigned for today.

Week 6 (October 27 - November 2)

Tuesday, November 2

No lecture today because of the midterm.

The midterm will be held in class on Tuesday, November 2. Here is a sample midterm that is similar in style and covers most of the same content as the midterm to be given on Tuesday.

Thursday, October 28

Slides

Lecture 11

Assigned readings:

Textbook: Chapter 26 (pages 773-799)

Week 5 (October 20 - October 26)

NOTE: The midterm will be on Tuesday, November 2, as shown in the syllabus. The slides in lecture 1 indicated that it would be on Thursday, October 28. That date is wrong. The test will be on November 2.

Slides

Tuesday, October 26

Lecture 10

Thursday, October 21

Lecture 9

Assigned readings:

Tuesday, October 26

Textbook: Chapter 24. (Pages 689-719)

Thursday, October 21

No textbook assignments for this class.

Week 4 (October 13 - October 19)

Slides

Tuesday, October 19

Lecture 8

Thursday, October 14

Lecture 7

Assigned readings:

Tuesday, October 19

Textbook: Chapter 12 (pages 309-335)

Web links:

A discussion on choosing secure passwords.

A short essay on the limits of using biometrics by Bruce Schneier. This essay is embedded in a longer newsletter. You need only read the section titled "Biometrics in Airports".

Thursday, October 14

No assigned readings for today.

Week 3 (October 6 - October 12)

Slides

Tuesday, October 12

Lecture 6

Thursday, October 7

Lecture 5

Assigned readings:

Tuesday, October 12

Textbook: Chapter 10, sections 10.1, 10.3, 10.4, and 10.5 (pages 245-246, 252-266) Thursday, October 7

Textbook: Chapter 9, sections 9.2.2.2-9.7 (pages 227-241)

Week 2 (September 29 - October 5)

Slides

Tuesday, October 5

Lecture 4

Thursday, September 30

Lecture 3

Assigned readings:

Tuesday, October 5

Textbook: Introduction to Section IV and Chapter 9, sections 9.1-9.2.2.2 (pages 215-227).

Thursday, September 30

Textbook: Chapter 2 (pages 31-44) and Chapter 15 (pages 381-396).

Week 1 (September 23 - September 28)

Tuesday, September 28

Lecture 2.

Thursday, September 23

Lecture 1.

Assigned readings:

Tuesday, September 28

Textbook: Chapter 4, Sections 4.1-4.6 (pages 95-114)

Chapter 5, Sections 5.1-5.2.2 (pages 123-132)

Chapter 6, Sections 6.1-6.2 (pages 151-155)

Chapter 7, Section 7.1 (pages 169-177)

Thursday, September 23

Textbook: Chapter 1 (pages 1-25)

Web links:

Improving the Security of Networked Systems, Julia Allen, Christopher Alberts, Sandi Behrens, Barbara Laswell, and William Wilson.

Why Computers Are Insecure, Bruce Schneier. (The link leads to an entire web page on various security subjects. Read it all, if you want, but the assignment is only this essay, which is around a page and a half.)

Social Engineering Fundamentals, Part I: Hacker Tactics Sarah Granger.

The Stuxnet worm was discussed in class. This article talks about how it was analyzed and determined to be intended for taking control of certain kinds of facilities.