|Introduction to Computer Security||10.11|
The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
The seminar's topics are going to be based on Ross Andreson's book "Security Engineering". After the introduction, each week, students will give a presentation of one of the chapters of the book.
|2||Usability and Psychology|
|10||Banking and Bookkeeping|
|12||Monitoring and Metering|
|13||Nuclear Command and Control|
|14||Security Printing and Seals|
|16||Physical Tamper Resistance|
|19||Electronic and Information Warfare|
|20||Telecom System Security|
|21||Network Attack and Defence|
|22||Copyright and DRM|
|23||The Bleeding Edge|
|24||Terror, Justice and Freedom|
|25||Managing the Development of Secure Systems|
|26||System Evaluation and Assurance|
One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.
Please note that you must send your slides in PDF format (as well as their sources) after your presentation to Orr, for the lecture to be counted for.
|24.11||Oron||Chapter 2 - Usability and Psychology|
|24.11||Abeer||Chapter 4 - Access Control|
|28.11||Danielle||Chapter 7 - Economics|
|28.11||Igal||Chapter 10 - Banking and Bookkeeping|
|1.12||Lior||Chapter 8 - Multilevel Security|
|1.12||Tal||Chapter 9 - Multilateral Security|
|8.12||Ben||Chapter 15 - Biometrics|
|2.1 (Thu.!)||Hamada||Chapter 13 - Nuclear Command & Control|
|2.1 (Thu.!)||Mohsen||Chapter 19 - Electronic and Information Warfare|
|5.1||Danny||Chapter 16 - Physical Tamper Resistance|
|12.1||Victor||Chapter 12 - Monitoring and Metering|
|12.1||Rose||Chapter 25 - Managing the Development of Secure Systems|
|19.1||Marawan||Chapter 24 - Terror, Justice and Freedom|
|30.1||Azmi||Chapter 26 - System Evaluation and Assurance|
|30.1||Firas||Chapter 20 - Telecom System Security|
Note that this schedule is not final, and may be changed!