Jim Hook CS 4/591

Winter 2007

Class Mechanics:

Class meets on Tuesdays and Thursdays, 6:00 -- 7:50pm, in Cramer Hall 283.

Office Hours: Mondays, 1:00 -- 3:00pm, FAB 120-05.

Texts:

Prerequisites: CS 333 (operating systems), CS 350 (algorithms).

Grading:

Class Mailing List

There is a class mailing list, infosec at cecs dot pdx dot edu. The web interface is:
https://mailhost.cecs.pdx.edu/mailman/listinfo/infosec

Please sign up on the list. Critical announcements about class will be made on this list.

Students Requiring Accommodation:
If you are a student with a disability in need of academic accommodations, you should register with Disability Services for Students and notify the instructor immediately to arrange for support services.

Term Paper Assignment

A term paper is due at the beginning of the last lecture. A title, abstract, annotated bibliography, and outline are due the day of the midterm. Assignment details here.

Calendar (with reading assignments): [Revised 1/22/07]

Lecture 1 (1/9): Introduction and Overview ppt pdf slides pdf handouts

Lecture 2 (1/11): Access Control ppt pdf slides pdf handouts

Lecture 3 (1/16): Canceled due to inclement weather.

Lecture 4 (1/18): Guest lecture on BotNets by Jim Binkley

Lecture 5 (1/23): Policy ppt pdf slides pdf handouts

Lecture 6 (1/25): Bell-La Padula ppt pdf slides pdf handouts (Download Bishop's slides for Chapter 5)

Lecture 7 (1/30) [Guest lecture by Professor Jim Binkley]: Cryptography

Lecture 8 (2/1): Integrity Models ppt pdf slides pdf handouts (Download Bishop's slides for Chapters 6 and 7)

Lecture 9 (2/6): Cryptography ppt pdf

Lecture 10 (2/8): Cryptography ppt pdf

Lecture 11 (2/13): Midterm exam. In class. Closed book. Blue book exam.

Hand in annotated bibliography for term paper.

Past study questions and exams are provided below.

Lecture 12 (2/15): Authentication and Design Principles

Lecture 13 (2/20): Identity, Public Policy, Data mining, Privacy

Lecture 14 (2/22): Access control and Information flow. Download Bishop's slides for Chapter 15
Note: there are a few extra }'s and one slide is repeated.

Supplementary material:

  1. Denning and Denning, 1977, available from ACM portal.
  2. Vincent Simonet, Flow Caml in a Nutshell.
  3. Flow Caml home page (I got the windows executable to work, but was not successful building the source distribution).
  4. A file derived from the flowcaml tutorial presented in class.

Lecture 15 (2/27): Information Flow follow up ppt pdf slides pdf handouts.

Lecture 16 (3/1): Confinement and Virtualization

Lecture 17 (3/6): Assurance ppt pdf slides pdf handouts (Download Bishop's slides for Chapter 17) and Evaluation ppt pdf slides pdf handouts (Download Bishop's slides for Chapter 18)

Lecture 18 (3/8): Malicious Logic

Lecture 19 (3/13): Intrusion Detection

Lecture 20 (3/15): Network Security

Final Exam: Tuesday, March 20, 7:30 - 9:20pm.

Additional web resources:

National Information Assurance Training and Education Center

Bishop's slides by chapter