|Introduction to Computer Security||16.3,23.3|
The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
The seminar's topics are going to be based on Ross Andreson's book "Security Engineering". After the introduction, each week, students will give a presentation of one of the chapters of the book.
|2||Usability and Psychology|
|10||Banking and Bookkeeping|
|12||Monitoring and Metering|
|13||Nuclear Command and Control|
|16||Physical Tamper Resistance|
|19||Electronic and Information Warfare|
|20||Telecom System Security|
|22||Copyright and DRM|
|23||The Bleeding Edge|
|24||Terror, Justice and Freedom|
|26||System Evaluation and Assurance|
One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.
Please note that you must send your slides in PDF format (as well as their sources) after your presentation to Orr, for the lecture to be counted for.
|20.4||Nuha||Chapter 2 - Usability and Psychology|
|20.4||Alon||Chapter 4 - Access Control|
|27.4||Raz||Chapter 8 - Multilevel Security|
|27.4||Ksenia||Chapter 20 - Telecom System Security|
|9.5||Roni||Chapter 15 - Biometrics|
|11.5||Andrey||Chapter 17 - Emission Security|
|16.5||Daniel||Chapter 19 - Electronic and Information Warfare|
|16.5||Vladimir||Chapter 22 - Copyright and DRM|
|25.5||Yonatan||Chapter 12 - Monitoring and Metering|
|1.6||Tomer||Chapter 23 - The Bleeding Edge|
|1.6||Elias||Chapter 10 - Banking and Bookkeeping|
Note that this schedule is not final, and may be changed!