00 Security Course Intro 2
00 Security Course Intro 2
2
Course contacts
▪ Course materials and up-to-date info in MyCourses:
https://mycourses.aalto.fi/course/view.php?id=37064
▪ MyCourses front page and announcements for the latest info
▪ MyCourses discussion forum for public questions
▪ Email: [email protected]
Please use this address for all course-related email.
Avoid sending email directly to the teachers.
▪ Sorry, no 24/7 chat forum
3
Learning objectives
▪ Learn concepts and abstractions for thinking and talking about
information security
▪ Learn the adversarial mindset of security engineering. Be able to
model threats and analyze the security of a system critically, from
the attacker’s viewpoint
▪ Understand the purpose and function of several security
technologies, as well as their limitations
– security policies , authentication, access control, cryptography, network
protocols, identity management etc.
▪ Have hands-on experience of security flaws in software,
to be a better programmer
▪ Basis for further study and research
4
Prerequisite knowledge
▪ Ability to program in many languages
▪ Broad knowledge of information technology
– Linux shell, Windows, databases, web programming, internet, C
5
Lectures
▪ Recorded lectures published during lecture period I
– Streaming and download from Panopto, link in MyCourses
– Approximately 10 lectures of 1-2 hours each, split to smaller parts
6
Weekly exercises
▪ Exercises provide hands-on experience especially in software
security to make us better programmers
▪ Exercises are not mandatory but strongly recommended
▪ 5 weekly rounds of exercises. Deadline Fridays at 18:00.
First deadline on 16 September 2021
▪ Problems published in MyCourses at least one week earlier
▪ No mandatory exercise sessions to attend
▪ Course assistant reception hours for help and advice:
– Tue, Wed and Thu at 16:15-18 on campus
9
Course plan
Lectures on information security: Exercises :
Course intro 1. Access control in Linux and
1. Access control models Windows
2. Access control in operating systems 2. Software and web security 1
3. User authentication (SQL injection)
4. Software security Note: The exercises focus on
5. Cryptography software security while the
3. Software and web security 2
6. Data encryption lectures(+exam) cover (web security)
information security broadly 4. Software and IoT security 3
7. Security protocols
8. PKI and web security (buffer overrun)
9. Threat analysis 5. Software and web security 4
10. Identity management (XSS)
10
Recommended reading
▪ Best coverage of the course syllabus :
– William Stallings, Computer Security: Principles and Practice, 4th ed.,
2018
▪ Better books by real experts, but less content covered:
– Matt Bishop, Computer Security. Art and Science, 2018 (for
prospective research students)
– Ross Anderson, Security Engineering: A Guide to Building Dependable
Distributed Systems, 3rd ed., 2020 (good reading)
▪ Read lecture slides, including the extra slides, and
search for online sources on each lecture topic!
11