The schedule below indicates the lecture videos and readings you are expected to cover each week. We recommend that you first view the lecture and then do the readings.
The lecture videos are available on the Canvas page for this course. The lectures are identified there by a number and the date they were delivered (in 2019). The schedule below uses an abbreviated notation: "1 (1/23)" indicates what the Canvas site identifies as "Lecture 1 Jan 23 - 2019".
Week starting |
Material you should study before Tuesday discussion | Topic |
9/7 | Lectures: 1 (1/23); 2 (1/28); 3 (1/30) Reading: Introduction |
Terminology and principles |
9/14 | Lectures: 4 (2/4); 5 (2/06); 6 (2/8) Reading: Symmetric cryptosystems and Authentication; IEEE Comm Article |
Authenticating machines |
9/21 | Lectures: 7 (2/11); 8 (2/13) Reading: Public key infrastructure; Certificate transparency |
Public key infrastructure |
9/28 | Lectures: 9 (2/18); 10 (2/20); 11 (2/27) Reading: Authenticating Humans; Use-based Privacy |
Authenticating humans |
10/5 | Lectures: 12 (3/4); 13 (3/6) Reading: Discretionary Access Control: sect 7.1. and sect 7.2 (sect 7.1.3 is optional) |
Discretionary access control (ACL) |
10/12 | Lectures: 14 (3/11) 15 (3/13) Reading: Discretionary Access Control: sect 7.3 and sect 7.4 |
Discretionary access control (Capabilities) |
10/19 | Lectures: 16 (4/8); 17 (4/10); 18 (4/15) Reading: Mandatory Access Control: sect 8.1 - sect 8.3. |
Mandatory access control |
10/26 | Lectures: 19 (4/17) Reading: Lampson paper; Credentials-based Authorization: sect 9.1. |
Credentials-based Authorization |
11/2 | Lectures: 20 (4/22); 21 (4/24) Reading: Monitoring; EM Class Policies; Inlined Reference Monitors; SFI Enforcement |
Monitoring |
11/9 | Lectures: 22 (4/29); 23 (5/01) Reading: Mapping and Multiplexing |
Isolation |
11/30 | Lectures: none Reading: An analysis of covert timing channels (Wray). |
Covert channels |
12/7 | Lectures: none Reading: none |
Hardware isolation |
12/14 | Lectures: 24 (5/06) Reading: Impediments with Policy Interventions to Foster Cybersecurity Investment |
Investment in defenses |