Date | Topic | Lecturer |
Jan 24 |
Introduction to Security, Cryptography I
Resources
|
Roberto, Zach^2 |
- Textbook chapters: 1.1, 1.3.1, 1.3.3, 8.1.1, 8.1.2, 8.1.3, 8.1.6
|
Jan 29 | Cryptography IIResources | Roberto |
Textbook chapters: 1.3.4, 8.1.4, 8.1.7, 8.3
|
Jan 31 | Cryptography IIIResources | Roberto, Zach K |
Textbook chapters: 1.3.2, 1.3.5, 8.2.1, 8.2.2, 8.4 (except 8.4.2), 7.1.2
|
Feb 5 | Physical SecurityResources | Roberto |
Textbook chapters: 1.2, 2.1, 2.2, 2.6, 9.1
|
Feb 7 | Web Security I: Web TechnologyResources | Roberto, Linda |
Textbook chapters: 7.1, 7.2.3
|
Feb 12 | Web Security II: Session Management and CSRFResources | Roberto, Olivia |
Textbook chapters: 7.1.4, 7.2.1, 7.2.7.
OWASP Cross-Site Request Forgery Prevention Cheat Sheet
|
Feb 14 | Web Security III: SQLI and XSSResources | Roberto |
Textbook chapters: 7.2.6, 7.3.3.
OWASP SQL Injection Prevention Cheat Sheet.
OWASP XSS Prevention Cheat Sheet
|
Feb 19 | Long Weekend (No Class) | |
|
Feb 21 | Web Security IV: Web Attacks | Roberto |
|
Feb 26 | PasswordsResources | Zach^2 |
Textbook Chapters: 1.4.2
|
Feb 28 | Multi-Factor AuthenticationResources | Roberto |
- Textbook Chapters: 2.3.3
- Nethanel Gelernter, Senia Kalma, Bar Magnezi, Hen Porcilan: The Password Reset MitM Attack. IEEE Symp. on Security and Privacy, 2017.
|
Mar 5 | OS SecurityResources | Roberto, Kimberly |
|
Mar 7 | MalwareResources | Roberto |
|
Mar 12 | Storage EncryptionResources | Roberto |
|
Mar 14 | SSL/TLSResources | Roberto |
|
Mar 19 | Networks I: Intro to NetworksResources | Roberto |
Textbook: Sections 5.1, 5.2.1, 5.2.2, 5.3.1, 5.3.2
|
Mar 21 | Networks II: ARP, IP, TCP, UDPResources | Roberto |
Textbook: Sections 5.2.3, 5.3.3, 5.3.4, 5.4.1, 5.4.2, 5.5.3
|
Mar 26 | Spring Recess (No Class) | |
|
Mar 28 | Spring Recess (No Class) | |
|
Apr 2 | Networks III: DNSResources | Roberto |
Textbook: 6.1
|
Apr 4 | Social EngineeringResources | Ernesto Zaldivar |
The following site provides an overview of social engineering techniques:
The news article and judicial opinion below address legal issues related
to security breaches:
The following report overviews cybersecurity insurance:
|
Apr 9 | Gaming Security | Don Stanford |
|
Apr 11 | Cloud Security | Roberto |
|
Apr 16 | Blockchains and Cryptocurrencies | Roberto |
|
Apr 18 | Security of Machine LearningResources | Roberto, Kimberly, Zach K |
Here are some of the papers cited in the lecture:
|
Apr 23 | Anonymization Networks | Megumi Ando, Olivia |
|
Apr 25 | Computer Security for Victims of Intimate Partner ViolenceResources | Thomas Ristenpart |
|