Return to class page

Topics and Readings

Drinking from the Firehose
Date Topic Book and Chapter Required Readings Related Readings
Sept 8
Sept 10
Sept 15 Cryptography PUIS Chapter 7 - Cryptography Basics Security Engineering - Chapter 5 - Cryptography
Sept 17
Sept 22
Sept 24 Secure Design Principles The Protection of Information in Computer Systems, up to part B. Engineering Principles for Information Technology Security

Managing and Understanding Entropy Usage
Sept 29 Passwords Security Engineering, Chapter 2 Section 4

PUIS pages 67-90
Enough With the Rainbow Tables: What You Need to Know About Secure Password Schemes

Enough With the Salts: Updates on Secure Password Schemes
Once seen as bulletproof, 11 million+ Ashley Madison passwords already cracked

Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick
Oct 1 Authentication Security Engineering Chapter 15
Oct 6
Oct 8
Oct 13
Oct 15 RFID Hacking
Oct 20
Oct 22 Software Security Smashing the Stack for Fun and Profit X-Ray Scans Expose an Ingenious Chip-and-Pin Card Hack
Oct 29
Nov 3 Format String Attacks
Nov 5 Article about Java Vulnerability
Nov 10 Hardware Security Security Engineering, Chapter 16

Security Engineering, Chapter 17

Intel x86 Considered Harmful

Revisiting the Black Sunday Hack

From the Eye of a Legal Storm, Murdoch’s Satellite-TV Hacker Tells All

Nov 12
Nov 17 Hardware Security and Trusted Systems PUIS Chapter 26 - Who do you trust? Reflection on Trusting Trust Trusted Computer System Evaluation Criteria
Nov 19 Malware
Nov 24 How to 0wn the Internet in Your Spare Time To Kill a Centrifuge

Stuxnet Under the Microscope

Dec 1 Penetration Testing / Backups PUIS Chapter 18 - Backups Data Backup Options
Dec 3 Personnel Security PUIS Chapter 9 - Personnel Security

PUIS Chapter 18 - Backups

Employment Background Checks: A Jobseeker's Guide
Dec 8 Physical Security Security Engineering - Chapter 11

PUIS Chapter 8 - Physical Security for Servers