Computer Security

Announcement: Regarding the exam... You may only take an outline of what you plan to talk about into the exam, no detailed notes, no slides, and no PowerPoint presentation. (The exception to this is the slides on Kerberos, which I will loan anyone who wants to use.)
Please send PDF files of your project reports to Peter as soon as possible, so they can be published below for everyone to read.
Exam questions from 2002 (also in PDF).
Exam questions from 2004 (also in PDF).
Exam questions for 2006 (also in PDF).
Course description.
The official course desciption.
Weekly notes
  1. Note 1 (also in PDF).
  2. Note 2 (also in PDF).
  3. Note 3 (also in PDF).
  4. Note 4 (also in PDF).
  5. Note 5 (also in PDF).
  6. Note 6 (also in PDF).
  7. Note 7 (also in PDF).
  8. Note 8 (also in PDF).
  9. Note 9 (also in PDF).
  10. Note 10 (also in PDF).
  11. Note 11(also in PDF).
  12. Note 12(also in PDF).
  13. Note 13(also in PDF).
  14. Note 14(also in PDF).
  15. Note 15(also in PDF).
Slides from lectures Note that these slides come from the homepage for the textbook.
  1. Chapter 5
  2. Chapter 6
  3. Chapter 7
  4. Chapter 8 or in Power Point.
  5. Chapter 9 or in Power Point.
  6. Chapter 11 or in Power Point.
  7. Chapter 12 or in Power Point.
  8. Chapter 13 or in Power Point.
  9. Chapter 14 or in Power Point.
  10. Chapter 15 or in Power Point
  11. Chapter 16 or in Power Point.
Possible topics for projects.
Student projects assigned.
Student reports.
CERT's list of statistics with security incidents reported, etc., over several years. Note the dramatic increase each year.
Crypto-Gram Newsletter.
Summaryof messages passed in Kerberos.
Slides from Brian Vinter's lecture in 2002 on "Security and Mobile Code".
Paper by Swift on Access Control in Windows 2000
Paper: "How to Think about Security"
Last modified: Tue Mar 13 10:45:35 CET 2007
Joan F. Boyar (