CS 5352 - Computer Security
General concepts and applied methods of computer security, especially as they relate to confidentiality, integrity, and availability of information assets. Topics include system security analysis, access control and various security models, identification and authentication, protection against external and internal threats, communication protocols and internet security.
Eric Freudenthal, firstname.lastname@example.org
With the multiplication of tasks that are performed on computers and the advent of globalization of computing in general, the topic of computer security becomes more and more important. We see in this course what is computer security, especially as it relates to the protection of information stored on the computers and exchanged between computers. Topics include: system security analysis, access control and various security models, identification and authentication, security in UNIX and Windows, communication security, cryptography, internet security, e-commerce security protocols.
"Introduction to Computer Security", by Matt Bishop, Addison Wesley, 2005.
- Matt Bishop's slides: http://nob.cs.ucdavis.edu/book/book-intro
- SWEET project home page: http://csis.pace.edu/~lchen/sweet/; download "Ubuntu 10 for SWEET"
- 4/6 Lab
- For Wed, 4/20
- Lab4: SSL (editable) http://wiki.utep.edu/download/attachments/41484301/3-SecureTransaction.doc
- 3/22 Labs
- for Wed, 3/30, labs from pace (hand in on paper)
- Lab2: More on linux: http://wiki.utep.edu/download/attachments/41484301/Lab2_YourLastName.doc
- Lab3: Port scanning: http://wiki.utep.edu/download/attachments/41484301/Lab3_YourLastName.doc
- 3/3: For monday 3/7:
- read chapter 7 (hybrid policies)
- note password on latest distribution of the sweet ubuntu VM is now 123456 (no longer 12345678)
- 2/16: for Monday 2/28
- Read through chapter 5 of the text
- Perform and hand-in (on paper or by email) SWEET intro to crypto lab http://csis.pace.edu/~lchen/sweet/modules/2-Cryptography.pdf
- Classes on 2/21 and 2/23 will be in 109 and taught by Andrew Neal
- 2/14 (updated 2/16):
- Setup your VM for SWEET following directions in their Linux Manual http://csis.pace.edu/~lchen/sweet/tutorials/LinuxTutorial.pdf. Complete through Chapter 2.
- Read through chapter 4 in text.
- 1/26: Be sure that you are a member of the class email listserv (this was done automagically if you received a message about it from Dr. Freudenthal):
- web interface: http://listserv.utep.edu/mailman/listinfo/cs-security
- email address: email@example.com