|Introduction to Computer Security||25.3|
The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
The seminar's topics are going to be based on Ross Andresson's book ``Security Engineering''. After the introduction, each week, students will give a presentation of one of the chapters of the book.
|2||Usability and Psychology|
|10||Banking and Bookkeeping|
|12||Monitoring and Metering|
|13||Nuclear Command and Control|
|16||Physical Tamper Resistance|
|19||Electronic and Information Warfare|
|20||Telecom System Security|
|21||Network Attack and Defense|
|22||Copyright and DRM|
|23||The Bleeding Edge|
|24||Terror, Justice and Freedom|
|26||System Evaluation and Assurance|
One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.
Please note that you must send slides in PDF format after your presentation to Orr, for the lecture to be counted for.
|19.4||Moria||Chapter 2 - Usability and Psychology|
|19.4||Mostafa||Chapter 4 - Access Control|
|26.4||Amir||Chapter 8 - Multilevel Security|
|26.4||Omer P.||Chapter 9 - Multilateral Security|
|3.5||Aviv||Chapter 15 - Biometrics|
|3.5||David||Chapter 17 - Emission Security||PDF Beethoven for screens|
|10.5||Sharon||Chapter 24 - Terror, Justice and Freedom|
|10.5||Anton||Chapter 19 - Electronic and Information Warfare|
|31.5||Rami||Chapter 20 - Telecom System Security|
|31.5||Adam||Chapter 26 - System Evaluation and Assurance|
|7.6||Roee||Chapter 21 - Network Attack and Defense|
|7.6||Tsufit||Chapter 13 - Nuclear Command and Control|
|14.6||Omer G.||Chapter 23 - The Bleeding Edge|
Note that this schedule is not final, and may be changed!