This page is organized by the weeks of the quarter in which lectures were given. The weeks are in inverse order, on the assumption you will most often be looking for the most recent week.
This class will be taught by Peter Reiher. The textbook is Computer Security: Art and Science, by Matt Bishop. Assigned readings are from this book, unless otherwise indicated. Dr. Bishop has also published a second textbook that contains selected sections of this book, with a similar title. I can't guarantee that all material assigned will actually be in this other book, and it will definitely be at different pages if it's there at all.
I will be lecturing on these subjects during the class.
The TA for the course is Peter Peterson -- pahp@cs.ucla.edu. The labs for this course will consist of 5 hands-on, practical and exploratory projects covering security-related topics, plus a small introduction to the lab software. Office hour and discussion section information, the lab manual and all necessary materials for the labs are located here.
Tuesday, March 11
Thursday, March 13
No class today.
For Tuesday: Textbook: Chapter 26 (Pages 773-799)
Thursday, March 6
Tuesday, March 4
None this week.
Thursday, February 28
Tuesday, February 26
For Tuesday: Textbook: Chapter 22 (Pages 613-642)
Thursday, February 21
Tuesday, February 19
For Thursday:
Textbook: Chapter 25 (pages 723-767)
For Tuesday:
Textbook: Chapter 26: (pages 773-799)
Thursday, February 13
Lecture 10. Note: This lecture has a lot of animations, so I've posted it in Powerpoint form. If you'd prefer to deal with it as a PDF, here it is.
Tuesday, February 11
No lecture due to midterm
For Thursday:
Textbook: Chapter 10, sections 10.1-10.2 (pages 245-251).
Thursday, February 7
We are departing here from the syllabus. Instead of discussing logging and auditing, this lecture is on key management issues. The logging and auditing material will be fit in later in the class. Until then, we will be a lecture "ahead" of the syllabus.
Tuesday, February 5
For Thursday:
Textbook: Chapter 10, sections 10.3-10.5.1 (pages 252-262).
For Tuesday:
Textbook: Chapter 9, sections 9.2.3-9.5 (pages 228 -240)
Thursday, January 31
Tuesday, January 29
For Thursday:
Textbook: Introduction to Section IV and Chapter 9, sections 9.1-9.2.2.1 (pages 215-227)
For Tuesday:
Textbook: Chapter 21, sections 21.1, 21.2, 21.8 (pages 571-580 and pages 591-604)
Thursday, January 24
Tuesday, January 22
For Thursday:
Textbook: Chapter 17, sections 17.1, 17.2, 17.3 (pages 439-448; you do not need to read the subsections of 17.3, though you're welcome to if you want to learn more about covert channels)
For Tuesday:
Textbook: Chapter 12 (pages 309-335).
Thursday, January 17
Tuesday, January 15
Tuesday, January 8
Thursday, January 10
Intro to DETERLab, the labs, and UNIX. (No slides; see labs wiki for more information.)
Textbook: Chapter 1 (pages 1-25)
Discretionary reading:
Web links:
Improving the Security of Networked Systems, Julia Allen, Christopher Alberts, Sandi Behrens, Barbara Laswell, and William Wilson.
Why Computers Are Insecure, Bruce Schneier. (The link leads to an entire web page on various security subjects. Read it all, if you want, but the assignment is only this essay, which is around a page and a half.)
Social Engineering Fundamentals, Part I: Hacker Tactics Sarah Granger.