Tentative Lecture Plan
| ||
Lecture/Date | Topics | Slides |
Week 1 (Jan 8, 10) | Introduction to the course; Chap 1: Overview of Security Chap 12: Design principles | |
Week 2 (Jan 14, 17) | Chap 2.2 Access Control Matrix Access control in OS Unix (Garfinkel book in Text book list in the main page) Microsoft Reference (http://technet.microsoft.com/en-us/library/cc781716.aspx) (Finished Lecture 2.1; Lecture 2.2 in the next week) | Math Review |
Week 3 (Jan 22, 24) | Chap 3 : HRU Access Control Model and results Chap 4 - 6 : Security Policies, Confidentiality and Integrity Models | |
Week 4 | (Quiz 1: THERE WILL BE A QUIZ) Chap 4 - 6 : Security Policies, Confidentiality and Integrity Models Chap 7 : Hybrid Models: Clark Wilson, Chinese Wall, [recommended readings: ANSI INCITS 359-2004 RBAC STANDARD OR NIST RBAC [“The Economic Impact of Role-Based Access Control”] (Finished Lecture 4; Lecture 5 in the next week) | |
Week 5 (Feb 5) | Chap 9: Basic Cryptography and Network Security | |
Week 6 (Feb 12) | (Continue Lecture 6) | |
Week 7 (Feb 19) | Chap 10, 11: Key management, Network security | |
Week 8 (Feb 26) | Midterm | |
Week 9 (March 5/7) | Authentication & Identity (Chap 11); Vulnerability Classification, Risk Management; Legal Issues (Stallings book; Chap 18), Physical Security | |
Week 10 (March 11/14) | (Spring break) | No Class |
Week 11 (March 18/21) | Information Privacy (Healthcare case study/example) | |
Week 12 (March 25/28) | Software Security: Strings, Race Conditions, SQL Injection / Cross-site Scripting (Chapter on String & Race Conditions from Seacord’s Secure Programming in C/C++) IDS, Auditing, Firewalls (Chap 22, 21) | |
Week 13 (April 2/4) | Introduction to Blockchain (and Case study in Healthcare) Guest: Runhua Xu, LERSAIS PhD Student | |
Week 14 (April 9/11) | Security & Privacy in Healthcare (CISS, HIPAA/HITECH, Secure Composite EHR Access) | |
Week 15 (April 16/18) | Misc. | |
Finals Week | Exam/ Project Due |