|Introduction to Computer Security||15.3,22.3|
The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
The seminar's topics are going to be based on Ross Andreson's book "Security Engineering". After the introduction, each week, students will give a presentation of one of the chapters of the book.
|2||Usability and Psychology|
|10||Banking and Bookkeeping|
|12||Monitoring and Metering|
|13||Nuclear Command and Control|
|16||Physical Tamper Resistance|
|19||Electronic and Information Warfare|
|20||Telecom System Security|
|22||Copyright and DRM|
|23||The Bleeding Edge|
|24||Terror, Justice and Freedom|
|26||System Evaluation and Assurance|
One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.
Please note that you must send your slides in PDF format (as well as their sources) after your presentation to Orr, for the lecture to be counted for.
|5.4||Yuri||Chapter 2 - Usability and Psychology|
|5.4||Nael||Chapter 4 - Access Control|
|12.4||Oren||Chapter 8 - Multilevel Security|
|12.4||Sagi||Chapter 9 - Multilateral Security|
|19.4||Lior||Chapter 10 - Banking and Bookkeeping|
|19.4||Asaf||Chapter 16 - Physical Tamper Resistance|
|3.5||Hilal||Chapter 12 - Monitoring and Metering|
|3.5||Maor||Chapter 13 - Nuclear Command and Control|
|10.5||Alex||Chapter 17 - Emission Security|
|24.5||Yaniv||Chapter 15 - Biometrics|
|24.5||Jad||Chapter 19 - Electronic and Information Warfare|
|31.5||Uri||Chapter 18 - API Security|
|31.5||Boris||Chapter 20 - Telecom System Security|
Note that this schedule is not final, and may be changed!