Information for Winter 08 C1236 --- Computer Security

This page contains pointers to Postscript versions of slides used in CS136, Computer Security. It also contains pointers to non-required reading and other material related to the class.

This page is organized by the weeks of the quarter in which lectures were given. The weeks are in inverse order, on the assumption you will most often be looking for the most recent week.

This class will be taught by Peter Reiher. The textbook is Computer Security: Art and Science, by Matt Bishop. Assigned readings are from this book, unless otherwise indicated. Dr. Bishop has also published a second textbook that contains selected sections of this book, with a similar title. I can't guarantee that all material assigned will actually be in this other book, and it will definitely be at different pages if it's there at all.

I will be lecturing on these subjects during the class.

TA and Labs

The TA for the course is Peter Peterson -- pahp@cs.ucla.edu. The labs for this course will consist of 5 hands-on, practical and exploratory projects covering security-related topics, plus a small introduction to the lab software. Office hour and discussion section information, the lab manual and all necessary materials for the labs are located here.

Final Exam

The final exam is Friday, March 21 from 3-6 in our usual room. It will be similar in format to the midterm exam, but somewhat longer. It will cover material from the entire class, including assigned readings from the textbook. Material that only appeared in lab manuals will not be on the test. 60-70% of the questions will be from material covered after the midterm. As with the midterm, the test is closed-book, closed notes.

Slides

Week 10 (March 10 - March 14)

Tuesday, March 11

Lecture 17.

Thursday, March 13

No class today.

Assigned readings:

For Tuesday: Textbook: Chapter 26 (Pages 773-799)

Week 9 (March 3 - March 7)

Thursday, March 6

Lecture 16.

Tuesday, March 4

Lecture 15.

Assigned readings:

None this week.

Week 8 (February 25-February 29)

Thursday, February 28

Lecture 14.

Tuesday, February 26

Lecture 13.

Assigned readings:

For Tuesday: Textbook: Chapter 22 (Pages 613-642)

Week 7 (February 18-February 22)

Thursday, February 21

Lecture 12.

Tuesday, February 19

Lecture 11.

Assigned readings:

For Thursday:

Textbook: Chapter 25 (pages 723-767)

For Tuesday:

Textbook: Chapter 26: (pages 773-799)

Week 6 (February 11-February 15)

Thursday, February 13

Lecture 10. Note: This lecture has a lot of animations, so I've posted it in Powerpoint form. If you'd prefer to deal with it as a PDF, here it is.

Tuesday, February 11

No lecture due to midterm

Assigned readings:

For Thursday:

Textbook: Chapter 10, sections 10.1-10.2 (pages 245-251).

Week 5 (February 4-February 8)

Thursday, February 7

Lecture 9

We are departing here from the syllabus. Instead of discussing logging and auditing, this lecture is on key management issues. The logging and auditing material will be fit in later in the class. Until then, we will be a lecture "ahead" of the syllabus.

Tuesday, February 5

Lecture 8

Assigned readings:

For Thursday:

Textbook: Chapter 10, sections 10.3-10.5.1 (pages 252-262).

For Tuesday:

Textbook: Chapter 9, sections 9.2.3-9.5 (pages 228 -240)

Week 4 (January 29-February 1)

Thursday, January 31

Lecture 7

Tuesday, January 29

Lecture 6

Assigned readings:

For Thursday:

Textbook: Introduction to Section IV and Chapter 9, sections 9.1-9.2.2.1 (pages 215-227)

For Tuesday:

Textbook: Chapter 21, sections 21.1, 21.2, 21.8 (pages 571-580 and pages 591-604)

Week 3 (January 22-26)

Thursday, January 24

Lecture 5

Tuesday, January 22

Lecture 4

Assigned readings:

For Thursday:

Textbook: Chapter 17, sections 17.1, 17.2, 17.3 (pages 439-448; you do not need to read the subsections of 17.3, though you're welcome to if you want to learn more about covert channels)

For Tuesday:

Textbook: Chapter 12 (pages 309-335).

Week 2 (January 15-19)

Thursday, January 17

Lecture 3

Tuesday, January 15

Lecture 2

Assigned readings:

Textbook: Chapter 4 (pages 95-120), Sections 5.1-5.2.2 (pages 123-132), Sections 6.1-6.2 (pages 151-155), Sections 7.1 (pages 169-177) (We'll get back to chapters 2 and 3 later.)

Week 1 (January 8-12)

Tuesday, January 8

Lecture 1.

Thursday, January 10

Intro to DETERLab, the labs, and UNIX. (No slides; see labs wiki for more information.)

Assigned readings:

Textbook: Chapter 1 (pages 1-25)

Discretionary reading:

Web links:

Improving the Security of Networked Systems, Julia Allen, Christopher Alberts, Sandi Behrens, Barbara Laswell, and William Wilson.

Why Computers Are Insecure, Bruce Schneier. (The link leads to an entire web page on various security subjects. Read it all, if you want, but the assignment is only this essay, which is around a page and a half.)

Social Engineering Fundamentals, Part I: Hacker Tactics Sarah Granger.