Computer Security (2010)

Computer Security is a Level 9 course given in Semester 2. See the ITO course descriptor.
Lectures are held on Mondays and Thursdays at 16:10, in 1 George Square G.8 (Gaddum lecture theatre)

Slides

Jan 11Introduction       view    print   
Jan 14Security landscape   view print
Jan 18Cryptography basics   view print
Jan 21Programming securely I   view print
Jan 25Hash functions   view print
Jan 28Symmetric ciphers view print
Feb 1Protocols I view print
Feb 4NO CLASS
Feb 8Security and Usability view
Feb 11Asymmetric ciphers view print
Feb 15Network and internet vulnerabilities    view print
Feb 18Network and Internet Defences view print
Feb 22Digital signatures view print
Feb 25NO CLASS
Mar 1Protocols II view print
Mar 4Email and Web Security view print
Mar 8Security models view print
Mar 11Selected topics view print
Mar 15Summary (Final lecture) view print
Mar 18NO CLASS

These are lecture slides, not comprehensive notes. You should supplement the slides with notes taken in lectures, and from your own reading. References and specific reading recommendations are given in slides, further guidance is given in lectures. The examinable material consists of what is covered in lectures (unless specifically excluded) and the reading recommended in lectures.

Exams

  • Past papers are on the ITO pages.
    The only solutions available are those already published.
    Older exams include questions on "BAN logic" which has since been removed from the syllabus.

Course resources

Practicals and Tutorials

There will be two practicals and two tutorials. Since the practicals are not assessed, we will use part of our time during the tutorials to review the practicals. Students are to attend only one tutorial sessions for each of Tutorial I and Tutorial II - participation will be arranged through ITO.

Tutorial I
  • Practical I examined a number of topics related to Applied Cryptography. Complete the answers to the practical and bring your solutions to your tutorial session.
  • Session 1: Tuesday, 16 Feb 2010, 10:00 - 12:00, AT 4.12.
  • Session 2: Wednesday, 17 Feb 2010, 14:00 - 16:00, AT 4.12.
  • See 12 Feb 2010 email from Tamise Totterdell for student groupings.
  • Presentation from Tutorial I.
Tutorial II
  • Practical II is on the topic of Web Security. Complete the answers to the practical and bring your solutions to your tutorial session. The following files can be used to record your answers (do not submit these files): PartA.txt, PartB.txt, PartC.txt, PartD.txt.
    Please play nice with your UML machine!
  • Session 1: Tuesday, 23 Mar 2010, 10:00 - 12:00, AT 4.12.
  • Session 2: Thursday, 18 Mar 2010, 10:00 - 12:00, AT 4.12.
  • Presentation from Tutorial II.
Tutorials are given to allow time to consider a few topics in more detail and solve problems, to show you the depth of knowledge you are expected to obtain beyond a surface reading of the course slides. There is only enough time to sample a few topics; you should cover other topics in your own study time.



Documents above are in PDF format. Comments, suggestions, corrections are welcomed.
To print course materials, make sure your PDF reader has the correct page size and orientation.

Copyright: except where stated, lecture notes and other course materials are Copyright (C) School of Informatics, University of Edinburgh, and respective authors. Please respect our rights over this material and contact us if you want to use it in another context.

Lectures in 2010 were given by Mike Just. Course materials by David Aspinall and Mike Just.


Home : Teaching : Courses : Cs 

Informatics Forum, 10 Crichton Street, Edinburgh, EH8 9AB, Scotland, UK
Tel: +44 131 651 5661, Fax: +44 131 651 1426, E-mail: school-office@inf.ed.ac.uk
Please contact our webadmin with any comments or corrections. Logging and Cookies
Unless explicitly stated otherwise, all material is copyright © The University of Edinburgh