From: Janet Davis (jlnd_at_cs.washington.edu)
Date: Mon Mar 08 2004 - 13:57:53 PST
Hi folks,
Network security really can be the topic of an entire course! See
below for topics this grad-level security course will cover.
Cheers,
Janet
-- Janet Davis jlnd_at_cs.washington.edu http://www.cs.washington.edu/homes/jlnd/ ---------- Forwarded message ---------- Date: Mon, 8 Mar 2004 13:46:34 -0800 From: David Wetherall <djw_at_cs.washington.edu> To: faculty <faculty_at_cs.washington.edu>, cs-grads <cs-grads_at_cs.washington.edu> Cc: Radia Perlman <Radia.Perlman_at_Sun.COM> Newsgroups: uw-cs.grads Subject: [Cs-grads] 590NS -- Computer and Network Security this spring quarter i'll be co-teaching a grad security course. some preliminary details are below, and a more detailed syllabus should be available on the web in about two weeks. like pedro and steve's courses, this is an initial offering; we do not have a regular security course, so please make good use of the opportunity. i'm also pleased to announce that radia perlman will be co-teaching this course. radia is with sun microsystems and moved to the area recently. she brings many, many years of experience in security and networking to the table. for starters, she has co-written one of the standard texts, which we will be using. hope to see you there! djw ---- 590NS: Computer and Network Security Spring 2004, MW 3:00-4:20, MGH287 on Monday, MUE153 on Wednesday. Instructors: David Wetherall and Radia Perlman Security issues are pervasive in the design of computer systems, especially distributed ones such as the Internet, and the many security incidents reported in the press tell us that the state of security is nowhere near as good as is needed. This course will provide a graduate level introduction to computer and network security, covering two kinds of material. First, we will discuss cryptography. Cryptography provides a very powerful set of primitives that can be used to construct various kinds of secure protocols; the vast majority of secure computer systems you encounter will depend on it. Topics include: threats, confidentiality, integrity and authenticity, private key schemes (DES, AES), secure hashes (SHA1), public key schemes (RSA, Diffie-Hellman, digital signatures), authentication, key management (Kerberos, PKI), examples of protocols in practice (SSL/TL S, IPSEC). The treatment of the cryptographic primivites will emphasize their properties and workings, rather than provide a formal mathematical study. Second, we will discuss security from the point-of-view of real-world vulnerabilities. The daily security grind that we experience -- viruses and worms, spam, denial-of-service and spyware -- has little to do with crypto per se. It involves topics such as: programs and bugs (buffer overruns, languages), operating system models (access control, sandboxing), user factors (passwords, policies), economic considerations (risk management and liability), the Internet architecture (DOS flooding attacks, firewalls) and implementation flaws in security schemes (randomness, timing attacks). These are diverse topics, and the treatment here will aim to discuss real vulnerabilities and link them with solution approaches. The course will meet twice a week (MW 3:00-4:20). It will be graded for credit and include both homeworks and a final. _______________________________________________ Cse461 mailing list Cse461_at_cs.washington.edu http://mailman.cs.washington.edu/mailman/listinfo/cse461
This archive was generated by hypermail 2.1.6 : Mon Mar 08 2004 - 13:57:58 PST