lecture_1

lecture_1 - Introduction CS 136 Computer Security Peter...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture 1 Page 1 CS 136, Winter 2010 Introduction CS 136 Computer Security Peter Reiher January 5, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture 1 Page 2 CS 136, Winter 2010 Purpose of Class To introduce students to computer security issues To familiarize students with secure software development To learn to handle security in today’s installations and systems
Background image of page 2
Lecture 1 Page 3 CS 136, Winter 2010 Description of Class Topics to be covered Prerequisites Grading Reading materials Homework Office hours Web page
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture 1 Page 4 CS 136, Winter 2010 Topics to Be Covered Cryptography and authentication Use, not design and analysis Crypto classes cover more deeply Access control and security models Secure software design and programming Secure protocols Network security – threats and countermeasures Operating systems security Security analysis and forensics Malware, common attacks, and important defenses
Background image of page 4
Lecture 1 Page 5 CS 136, Winter 2010 Prerequisites CS111 (Operating Systems) CS118 (Computer Networks) Or equivalent classes elsewhere If you aren’t familiar with this material, you’ll be at a disadvantage Talk to me if you want to take this class, anyway
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture 1 Page 6 CS 136, Winter 2010 Teaching Assistant David Jurgens jurgens@cs.ucla.edu Weekly recitation sections Fridays at 8-10 Botany 325 Won’t cover new material But likely to be helpful with problems with lectures Will also handle all homework issues Office hours: TBA
Background image of page 6
Lecture 1 Page 7 CS 136, Winter 2010 Grading Midterm – 25% Homeworks – 25% Final – 50%
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture 1 Page 8 CS 136, Winter 2010 Class Format A lecture class Usually discussion of recently covered material at start of the class Then lecture on new material Questions and discussions always welcomed
Background image of page 8
Lecture 1 Page 9 CS 136, Winter 2010 Reading Materials Textbook Non-required supplemental text Optional papers and web pages
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture 1 Page 10 CS 136, Winter 2010 Textbook Computer Security: Art and Science By Matt Bishop Available in UCLA bookstore Bishop has a shorter version That’s not the one we’re using First reading assignment: Chapter 1
Background image of page 10
Lecture 1 Page 11 CS 136, Winter 2010 Supplemental Text Secrets and Lies By Bruce Schneier Not a textbook at all A philosophy of computer security Great for appreciating the field and problems Not great for depth of technical details Not required No readings will be assigned from this book But if you plan to work in this field, read it
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture 1 Page 12 CS 136, Winter 2010 Papers and Web Pages Non-required reading material Might or might not be assigned each week Usually made available electronically Through class web page Generally relevant news stories or discussion of security topics
Background image of page 12
Lecture 1 Page 13 CS 136, Winter 2010 Homeworks Five assignments Requiring practical work Performed on the Deter testbed Can be done from any connected location Individual, not group, assignments
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 75

lecture_1 - Introduction CS 136 Computer Security Peter...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online