Lectures and Workshops Spring 2010 - INF3510 Information Security

Week Date L# Lecture Topic Notes Reading Workshops
W04  25.01.2010 L01  Background and Basic Concepts  L01 Book (Ch.1: p.1-19, Ch.2: p.37–81), X.800 (Definitions of concepts)  
W05  01.02.2010 L02  Cryptography  L02  Book (Ch.8: p.349-375)  WS01
W06  08.02.2010 L03  Key Management and PKI  L03  Book (Ch.8: p.375-382). For interested:  NIST-SP800-57, X.509  WS02
W07  15.02.2010 L04  Authentication  L04  Book (Ch.7: p.338-343). For interested: Introduction to Biometric Recognition  WS03
W08  22.02.2010 L05  Access Control and Security Models  L05  Book (Ch.4: p.141-142, Ch.5: p.181-182). For interested: Bell-LaPadula, Clark-Wilson, Brewer-Nash, RBAC  WS04
W09  01.03.2010 L06  Communication Security  L06  Book (Ch.8: p.382-391), X.800 (Layers for security services)  WS05
W10  08.03.2010 L07  Identity and Access Management  L07  Book (Ch.6: p.275-282), For interested: FADS, NeAF  WS06
W11  15.03.2010 L08  Perimeter Security  L08  Book (Ch.6: p.244-275, Ch.7: p.289-337)  WS07
W12  22.03.2010 L09  Physical Security and the Human Factor  L09  Book (Ch.9 & Ch.11)  WS08
W13 No lecture    
W14 No lecture    
W15  12.04.2010 L10  Computer Security and Trusted Systems  L10    WS09
W16  19.04.2010 L11 Security Management and Secure Systems Development  L11  Book (Ch.3 and Ch.5). For interested: 10 Deadly Sins of IS  WS10
W17  26.04.2010 L12  Risk Management and Business Continuity Planning  L12  Book (Ch.4). For interested: NIST SP800-30, NIST SP800-34  WS11
W18  03.05.2010 L13  Application Security and Trust Management  L13    WS12
W19  10.05.2010 L14  Privacy and Computer Forensics  L14    WS13
W20  18.05.2010 L15  Review. 10:15h - 12:00h Store Aud.  Review    WS14
W21 No lecture
   
W22  04.06.2010  Exam time 14:30h - 17:30h    

Back to INF3510 main site.