Class Schedule

by

Week 1

Course Intro and Discussion

  • Reading Assignment: Chapter 1
  • Assignment of Project 1: Analysis of Security Events

Information Security Discussion based on Chapter 1

Week 2

Threats and Vulnerabilities (Project Reports Part 1)

Threats and Vulnerabilities (Project Reports Part 2)

  • Reading Assignment Chapter 2

Week 3

Modern Cryptography

Modern Cryptography (continued)

  • Reading Assignment Chapter 3

Week 4

Software vulnerabilities and consequences

More consequences, countermeasures

  • Reading assignment Chapter 4

Week 5

Memory Protection

Access Control and Authentication

Week 6

Week 7

Week 8

Week 9

Week 10

Spring Break

Week 11

Week 12

Week 13

Week 14

Week 15

Advertisements

2 Responses to “Class Schedule”

  1. Ian Axelrod Says:

    Is it possible that we can add a review of the effects of quantum computers on information security?
    -Ian

  2. richde Says:

    Sure. There are two ways quantum computing fits it and they both relate to cryptography. Ther first is the field of quantum cryptography, an approach that uses entangled quantum states of exchanged photons to encrypt data. The second is using quantum computers to factor large numbers (necessary for cracking public key cryptosystems) We’ll see where we can fit it in.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: