(Tentative) Topics Schedule Week January 2010 Su Mo Tu We Th Fr Sa 1 17 18 19 20 21 22 23 Introduction 2 24 25 26 27 28 29 30 Attacks, cybercriminals, defense methods. 31 February 2010 Su Mo Tu We Th Fr Sa 3 1 2 3 4 5 6 Intro to Cryptography 4 7 8 9 10 11 12 13 Substitutions and Permutations; block ciphers 5 14 15 16 17 18 19 20 Public key encryption 6 21 22 23 24 25 26 27 Program Security, nonmalicious program errors 28 March 2010 Su Mo Tu We Th Fr Sa 7 1 2 3 4 5 6 Viruses and other malicious code 8 7 8 9 10 11 12 13 Controls, midterm. 9 14 15 16 17 18 19 20 Protection in general purpose Operating Systems 10 21 22 23 24 25 26 27 Memory Protection, access control 28 29 30 31 Spring April 2010 Su Mo Tu We Th Fr Sa 1 2 3 Recess 11 4 5 6 7 8 9 10 File protection mechanisms, user authentication 12 11 12 13 14 15 16 17 Designing Trusted Operating Systems 13 18 19 20 21 22 23 24 Design and assurance 14 25 26 27 28 29 30 Security in Networks; concepts, threats May 2010 Su Mo Tu We Th Fr Sa 1 15 2 3 4 5 6 7 8 Controls. 9 10 11 12 13 14 15 Finals Week