Lectures
The lectures will follow the course book, Computer Security, third edition, by D. Gollman. You will have to order the book yourself so it is a good idea to do it as soon as possible if you want it.
Lectures: 28 hours
Time and place:
See below
For exchange students:
Lectures will be in Swedish. It is possible to meet with Martin once per week and discuss the lectures from the previous week. This meeting will last for approximately 1 hour.
2015 Lectures:
A zip of the lectures from 2015 can be found here. You can look at them if you want to read ahead, but some lectures will not be identical to the ones 2016. It is your own responsibility to make sure that you look at the 2016 lectures when studying for the exam or doing home assignments (though the differences are probably small).
Preliminary schedule 2016:
Date | Location | Content | Chapter | Slides |
19/1, 13-15 | MA:06 | Introduction, Foundations of Computer Security | 2,3 | |
20/1, 13-15 | MA:06 | Cryptography, Digital Certificates, part 1 | 14, 15.5 | |
21/1, 13-15 | MA:06 | Cryptography, Digital Certificates, part 2 | 14, 15.5 | ^ |
26/1, 13-15 | MA:06 | Identification & Authentication | 4 | |
27/1, 15-17 | MA:06 | Access Control, Reference Monitors | 5,6 | |
28/1, 13-15 | MA:06 | Windows Security | 8 | |
2/2, 13-15 | MA:06 | Unix Security | 7 | |
4/2, 13-15 | MA:06 | Security Eval, Key Establishment | 13, 15 | pdf, pdf |
9/2, 13-15 | MA:06 | Key Establishment cont'd, Communications Security | 15, 16 | |
15/2, 8-10 | MA:04 | Communications Security cont'd, Network Security | 16, 17 | |
16/2, 13-15 | MA:06 | Software Security | 10 | |
22/2, 8-10 | MA:04 | Bell-LaPadula Model, Security Models | 11,12 | |
23/2, 13-15 | MA:06 | Guest lecture: Stuxnet, malware deluxe | ||
1/3, 15-17 | MA:06 | Mobility | 19 |