| Title | Author | Created | Published | Tags | | ----------- | ---------------------------- | ------------ | ------------ | -------------------------- | | Course Plan | <ul><li>Jon Marien</li></ul> | May 05, 2025 | May 05, 2025 | [[#INFO47721\|#INFO47721]] | | Week | Topic | Handouts | Labs and <br>Assignments | | ------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------ | | 1 | Introduction <br>1. [An Overview of Computer Security](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/01.pdf?ou=1387466) | | [MB] Chapter 1 | | 2 | Foundation <br>2a. [Access Control Matrix](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/02.pdf?ou=1387466) <br>2b. [Foundational Results](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/03.pdf?ou=1387466) | | [MB] Chapter 2 <br>[MB] Chapter 3 | | 3 | 3a. [Security Policies](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/04.pdf?ou=1387466) <br>3b. [Confidentiality Policies](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/05.pdf?ou=1387466) <br>3c. [Integrity Policies](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/06.pdf?ou=1387466) | | [MB] Chapter 4 <br>[MB] Chapter 5 <br>[MB] Chapter 6 | | 4 | 4a. [Hybrid Policies](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/07.pdf?ou=1387466)<br><br>4b. [Computer Security Architecture](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/ch08-General%20Computer%20Security%20Architecture.pdf?ou=1387466)<br><br>**PROJECT PROPOSAL DUE** | | [MB] Chapter 7<br><br>[SJ] Chapter 8 | | 5 | Implementation I: Cryptography <br>5a. [Key Management](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/09.pdf?ou=1387466) <br>5b  [Cipher Techniques](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/10.pdf?ou=1387466) | | [MB] Chapter 10 <br>[MB] Chapter 11 | | 6 | 6a. [Authentication](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/11.pdf?ou=1387466) | [](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/Handouts/INFO43921_Handout08_OtherMalware.pdf?ou=1387466) | [MB] Chapter 12 | | 7 | Implementation II:  Systems <br>7a. [Design Principles](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/12.pdf?ou=1387466) <br>7b. [Representing Identity](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/13.pdf?ou=1387466) | | [MB] Chapter 13 <br>[MB] Chapter 14 | | June 25 - 29 | Reading Week | | | | 8 | 8a. [Access Control Mechanisms](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/14.pdf?ou=1387466) <br>Reading assignment: <br>8b. [Information Flow](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/15.pdf?ou=1387466) <br>8c. [Entropy and Uncertainty](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/Lectures/32.pdf?ou=1387466) | | [MB] Chapter 15 <br>[MB] Chapter 16 <br>[MB] Chapter 32 | | 9 | 9a. [Confinement Problem](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/16.pdf?ou=1387466) <br>Assurance <br>9b. [Introduction to Assurance](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/17.pdf?ou=1387466) | | [MB] Chapter 17 <br>[MB] Chapter 18 | | 10 | Special topics <br>10b. [Evaluating Systems](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/18.pdf?ou=1387466) <br>10c. [Auditing](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/21.pdf?ou=1387466) | | [MB] Chapter 21 <br>[MB] Chapter 23 <br>[MB] Chapter 24 | | 11 | Practicum <br>12a. [Network Security](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/23.pdf?ou=1387466) <br>12b. [System Security](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/24.pdf?ou=1387466) | | Reading: <br>[MB] Chapter 26 <br>[MB] Chapter 27 | | 12 | 13a. [User Security](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/25.pdf?ou=1387466) <br>13b. [Program Security](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/IntroLectures/26.pdf?ou=1387466) | | Reading: <br>[MB] Chapter 28 <br>[MB] Chapter 29 | | 13 | | [Samples](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/Assignments/INFO47721_Test_SampleQuestions.pdf?ou=1387466) | [READINGS](https://slate.sheridancollege.ca/content/enforced/1387466-1255_1339/Assignments/INFO47721_ReadingsForTest.pdf?ou=1387466) | | 14 | Final Exam - TBA | | |