Difference between revisions of "Courses/Computer Science/CPSC 526.W2015"

From wiki.ucalgary.ca
Jump to: navigation, search
m (Question of the Day (BQoD))
m (Lecture Schedule)
Line 40: Line 40:
== Lecture Schedule ==
== Lecture Schedule ==
=== January 12: Intro and Overview ===
Please see the [http://www.ucalgary.ca/pubs/calendar/current/academic-schedule.html University Academic Calendar] for important add/drop dates, holidays, etc.
* Course policies, grading, etc.
[[Courses/Computer_Science/CPSC_526.W2015/Lecture Notes]]
* Concepts / Organization
With some background in security concepts and principles, we set security challenges and problems into a networked environment. Basic crypto primitives become building blocks of systems whose major focus is ''authentication'' and protecting the confidentiality and integrity of communications channels. This major topic is complemented with a variety of security mechanisms that attempt to provide C-I-A in other ways (e.g., firewalls, IDS, authentication systems & standards).
This section contains the class session notes.
* Topics (i.e., knowledge & skills I want you to know by the end of the semester)
** common networking tools
** bit-level agility (packet crafting)
** working knowledge of common applied crypto
** authentication and secure protocols (design and major examples)
** network security application domains: routing security, web security
** network security mechanisms: firewalls, IDS, etc.
* Semester Highlights
** EDURange
** ScapyHunt
** PGP key signing party
** web application hacking (Google Gruyere)
** build a VPN
** build a CA
** network introspection
* Telephone
* Burning Question
** Name / Psuedonym
** One question you want answered by the end of the semester
=== Jan 14: Important Concepts ===
* Slides: http://pages.cpsc.ucalgary.ca/~locasto/teaching/2015/CPSC526/Winter/talks/intro-concepts.pdf
* Notes:
** "A Research Agenda Acknowledging the Persistence of Passwords" http://research.microsoft.com/apps/pubs/?id=154077
== Tutorial Schedule ==
== Tutorial Schedule ==

Revision as of 16:33, 16 January 2015

Network Systems Security

CPSC 526 - Network Systems Security

Attacks on networked systems, tools and techniques for detection and protection against attacks including firewalls and intrusion detection and protection systems, authentication and identification in distributed systems, cryptographic protocols for IP networks, security protocols for emerging networks and technologies, privacy enhancing communication. Legal and ethical issues will be introduced.

The lectures for this course run concurrently with CPSC626.

Course Policies

For the complete list of course policies, grading scheme, and tentative list of topics, please refer to the official course outline: http://www.cpsc.ucalgary.ca/custom/undergrad/outlines2015/w15/cpsc526and626_winter2015.pdf


Network Security: Private Communication in a Public World, 2nd Edition by Charlie Kaufman, Radia Perlman, and Mike Speciner

A few supplemental textbooks (not required at all, just further reading or background for those interested)


  • HW1 - 250 points
  • HW2 - 250 points
  • Roving Assignment - 100 points
  • Midterm Exam - 100 points (March 9th)
  • Final Exam - 300 points


We will not use D2L. Instead, we will use Piazza for class communication.

This term we will be using Piazza for class discussion. The system is highly catered to getting you help fast and efficiently from classmates, the TA, and myself. Rather than emailing questions to the teaching staff, I encourage you to post your questions on Piazza. If you have any problems or feedback for the developers, email team@piazza.com.

Find our class page at: https://piazza.com/ucalgary.ca/winter2015/cpsc526/home

Lecture Schedule

Please see the University Academic Calendar for important add/drop dates, holidays, etc.

Courses/Computer_Science/CPSC_526.W2015/Lecture Notes

This section contains the class session notes.

Tutorial Schedule

Here is the (tentative) schedule of tutorial topics.

Courses/Computer Science/CPSC 526.W2015/Tutorial_Schedule

Question of the Day (QoD)

  • Jan 14: CryptoPro asks "What is the most practical way to protect a network?"