September |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
1 |
5 |
6
UBC-wide orientation.
No classes. |
7 |
8
Before the class:
- Connect to the course on Canvas.
- Sign up for Piazza site of the course to receive course announcements.
- Learn about academic integrity by studying UBC’s Policy on Academic Misconduct and information resources provided at “Understand Academic Integrity“.
- Study the course syllabus.
Learning objectives:
- Academic Integrity
During the class:
- Course overview.
- Quiz on the knowledge of the course syllabus and academic integrity.
|
9 |
2 |
12
1:15–2:30 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) Intro to lab sessions,
2) Overview of buffer overflow |
13
Topic: Buffer Overflow
Before the class:
- Make sure you can connect to the course on Canvas to be able to take the Entrance Quiz during the class.
- Study and prepare to be quizzed on buffer overflow:
- Vulnerability and Exploits (watch from 25:45 to the end)
- Countermeasures (watch from 25:43 to 43:48)
- Study and prepare to be quizzed on the Basics of the Economics of Cybersecurity (42m)
-
- Study A brief history (8m).
- Study Introduction to economics (10m).
- Study The economics of information goods (13m).
- Study Security from an economic perspective (11m),
- Optionally, read a detailed analysis of a buffer overflow vulnerability in an earlier version of WhatsApp.
Learning Objectives:
- Buffer Overflow
- Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Entrance Quiz on Buffer Overflow and Math Essentials
- Presentations of term projects from previous cohorts.
|
14 |
15
Topic: Introduction to Cybersecurity
Before the class:
- Study sections 1.1-1.6 & 1.8 of Chapter 1 from Computer Security and the Internet: Tools and Jewels [CSI-TJ].
Learning Objectives: Introduction to Cybersecurity
During the class:
- Discussion of the material studied for this class.
- Quiz on the study material for the class.
|
16
|
3 |
19
UBC Closed.
No classes or office hours. |
20
Topic: Principles of Designing Secure Systems
Before the class:
- Study section 1.7 of Section 1.7 from Computer Security and the Internet: Tools and Jewels [CSI-TJ].
Learning Objectives: Design Principles
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
21
Due: Assignment 1: Risk Analysis. See Canvas for submission instructions and deadline details. |
22
Topic: Introduction to Cryptography (part I)
Before the class:
- Study Cryptography 101: Goals, Basics, Substitution Ciphers
- Study all micro-modules of ancient cryptography and Ciphers modules.
- Study Stamp Sections 2.1–2.3, 2.6, 2.7. Feel free to supplement the reading with Stamp video lectures on on the corresponding sections.
- Optionally, read Stamp 2.4, 2.5.
Learning Objectives: Introduction to Cryptography (part I)
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
23
|
4 |
26
12:45–2:00 PM:
Instructor’s Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) In-class assignment on cryptography,
2) Overview of home assignment 2 |
27
Topic: Introduction to Cryptography (part II)
Before class:
- Get clear understanding of confusion and diffusion properties of ciphers by studying this short explanation.
- Study Modern Crypto History: Stamp 2.5. Feel free to supplement the reading with Stamp video lectures on on the corresponding sections.
- Study Random Oracle model and its versions for hash functions, block ciphers, and stream ciphers:
- Anderson: Section 5.3 (introduction, 5.3.1, 5.3.2, 5.3.3).
- Random Oracle in Pictures.
- Study properties of hash functions: Stamp: Sections 5.1 & 5.2. Feel free to supplement the reading with a video of Stamp’s lecture on Hash Function properties.
- Bonus Material: study Birthday Paradox and Birthday Attack. Stamp Sections 5.3, 5.4.
- Bonus Material: Study Vigenere cipher by reading Anderson Section 5.2.1.
Learning Objectives:
- Introduction to Cryptography (part II)
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
28 |
29
Topic: Stream and Block Ciphers Under the Hood
Before the class:
(most videos are short)
- Optionally, view this gentle introduction into stream ciphers, videos 1, 2, 3,
- Study Stamp Sections 3.1 and introductory text in 3.2 (but not 3.2.1 or 3.2.2). Feel free to supplement the reading with Stamp video lectures: parts 1& 2 from Chapter 3.
- Study random number generators: video 1, and Stamp’s lecture on Random Numbers in Cryptography.
- Study required properties of block ciphers (5m).
- Study AES:
- Stamp Section 3.3.4, feel free to compliment it with viewing Stamp’s lecture on AES.
- AES animation demo (enjoy the soundtrack).
- Videos 1, 2, 5, 11, 12, 13 on the mechanics of AES.
- Bonus material: Study A5/1 cipher
- Pages 7-10 of the slides.
- Video animation of A5/1.
- Optionally, watch the rest of the video lectures on AES (3, 4, 6, 7, 8, 9, 10, 14, 15) from applied crypto playlist.
Learning Objectives: Stream and Block Ciphers Under the Hood
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
- Presentation of a previous year term project.
|
30
Truth and Reconciliation Day
No Classes
|
|
|
October |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
5 |
3
1:15–2:30 PM:
Instructor’s In-person (KAIS 4047) and Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) Team presentations of project ideas and possible methodology designs
|
4
Topic: Modes of Operation and Hash Functions
Before the class:
- Modes of operation for block ciphers
- Study Stamp Section 3.3.6. (Feel free to supplement the reading with Stamp video lectures: parts 8 & 9 of Chapter 3.)
- Study modes of operations for block ciphers: ECB, CBC, and CTR, and optionally: CFB.
- MAC: Stamp Section 3.4.
- Hash functions:
- Study Non-cryptographic Hash Functions Stamp Section 5.5.
- Study Cryptographic hash functions: video Lecture 1.1 (first 21 minutes) of this video material on Cryptocurrencies.
- Optionally, watch HMAC video (from 6m12s to the end) and read Stamp Section 5.7.
Learning Objectives: Modes of Operation and Hash Functions
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
5
Due: Assignment 2: Cryptanalysis. See Canvas for submission instructions and deadline details. |
6
Topic: Asymmetric Ciphers
Before the class:
- Study Stamp Chapter 4, all sections except 4.3.2, 4.3.3, 4.5. (which are optional). Feel free to supplement the reading with Stamp video lectures on Chapter 4.
Learning Objectives: Public Key Cryptography
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
7
9:00–10:00 AM:
Instructor’s Zoom Office Hours. |
6 |
10
Thanksgiving Day. University closed.
No Classes, lab sessions, or Office Hours |
11
In the class:
Term project proposals presentations
Last day to obtain authorization for third-party system security analysis from the UBC IT Security.
Due: Term Project Proposal. See Canvas for submission instructions and deadline details. |
12 |
13
Topic: Authentication and Key Establishment Over Insecure Networks
Before the class:
- Review DH protocol with this very affordable videos.
- Study Stamp Sections 9.1-9.4, 9.6, 9.7. Feel free to supplement the reading with Stamp video lectures on Chapter 9.
Learning Objectives: Simplified Authentication and Key Establishment Protocols
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
14 |
7 |
17
12:45–2:00 PM:
Instructor’s Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) Review of sample questions for midterm exam.
|
18
Topic: Authentication and Key Establishment Over Insecure Networks
Before the class:
- Review problems and questions discussed in the previous class.
Learning Objectives: Simplified Authentication and Key Establishment Protocols
During the class:
- Quiz on the study material for the class.
- Guest lecture.
- Continue discussing the material studied for the previous class.
|
19 |
20
Mid-term exam
The exam is on all the material studied until the exam. |
21
|
8 |
24
12:45–2:00 PM:
Instructor’s Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) In-class assignment on hashing in real-world systems,
2) Overview of home assignment 3
|
25
Topic: Real World Security Protocols
Before the class:
- Study Stamp Sections 10.1-10.3, 10.5-10.8. You can compliment your reading with Stamp video lectures on Chapter 10.
- Optionally, watch WEP vs. WPA explanation.
Learning Objectives: Real World Security Protocols
During the class:
- Quiz on the study material for the class.
- Midterm anonymous feedback for the teaching staff.
- Discussion of the material studied for this class.
|
26 |
27
Topic: Authentication of Humans to Computers
Before the class:
- Study all sections of Stamp Chapter 6 “Authentication“ (Feel free to compliment your reading with Stamp video lectures on Chapter 7).
- Study “Passwords — A Guide to the Ruins and Lessons for Improvement” by Dr. Cormac Herley (length: 1h25m).
Learning Objectives: Authentication of Humans to Computers
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
28
|
|
|
November |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
9 |
October 31
9:00–10:45 AM:
Instructor’s Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) Team presentations of progress on final projects |
1
Topics: Designing and Building (More) Secure Software
Before the class:
- Study the following parts of Software Security Lecture 4:
- Security Requirements and Abuse Cases (26m46s-30m14s).
- Design Flaws (30m20s-32m46s).
- Top Design Flaws (1h07m18s-1h16m30s).
- VSFTPD case study (1h16m30s-1h27m45s).
- Bonus Material: study Web (in)Security.
Learning Objectives: Designing and Building (More) Secure Software
During the class:
- Quiz on the study material for the class.
- Guest lecture.
- Discussion of the material studied for this class.
|
2
Due: Assignment 3: VPN. See Canvas for submission instructions and deadline details. |
3
Topic: Economic, Organizational, and Political Aspects of Cybersecurity
Before the class:
Optionally refresh your memory of Part 1 (the same as for the Entrance Quiz): Basics (42m)
- Study A brief history (8m).
- Study Introduction to economics (10m).
- Study The economics of information goods (13m).
- Study Security from an economic perspective (11m).
Study the following video lectures on the economics of cybersecurity:
Part 2: Security Metrics (39m)
- Study What to measure? (9m).
- Study Measuring security levels (9m).
- Study Metrics in practice (9m).
- Study Metrics from incident data (12m).
Bonus Material:
Part 3: Security Investment and Risk Management (47m)
- (Bonus) Study Information security strategy (11m).
- (Bonus) Study Information security investment (10m).
- (Bonus) Study Risk management (13m).
- (Bonus) Study Operational security management (13m).
Learning Objectives: Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
4
Due: Term Project Pre-final Report (optional for Design and Implementation project teams). See Canvas for submission instructions and deadline details. |
10 |
7
12:45–2:00 PM:
Instructor’s Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) In-class assignment on reverse engineering,
2) Overview of home assignment 4 |
8
Topic: Economic, Organizational, and Political Aspects of Cybersecurity
Before the class:
Study video lectures on the economics of cybersecurity (continued):
Part 4: Market Failures (43m)
- Study Market failures (12m).
- Study Policy interventions (13m).
- Study Case study 1: Information sharing in incident response (8m).
- Study Case study 2: payment card security (10m).
Part 5: Behavioural research into security & Policy Implications (38m)
- Study Prospect Theory (10m).
- Study Heuristics and social persuasion (16m),
- Study Behavioural economics of privacy (12m).
- Optionally: Consumer behaviour and deception,
- Optionally: Security economics and policy.
Learning Objectives: Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
9
Midterm Break, No Classes |
10
Midterm Break, No Classes |
11
Midterm Break, No Classes
Remembrance Day, UBC closed. |
11 |
14
No instructor’s office hours.
3-5 PM: Lab session
Topics:
1) Intro to coin mining contest,
2) Team presentations of preliminary findings of final projects
5 PM:
coin-mining contest starts |
15
Topic: Usable Privacy and Security
Before the class:
- Study 1 — Introduction (56m).
- Optionally, watch 2 — Design.
- Study 3 — Evaluating usable security design (1h13m).
- Study Neilsen’s Usability Heuristics.
Learning Objectives: Usable Privacy and Security
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
5:15–6:30 PM:
Instructor’s Zoom Office Hours. |
16
Due: Assignment 4: Reverse Engineering. See Canvas for submission instructions and deadline details. |
17
Topic: Usable Privacy and Security
Before the class:
- Study 4 — Guidelines for Secure Interaction Design (58m).
- Study 5 –Usable Authentication (49m)
- Optionally: Read Section 3 (“Design Principles”) of User Interaction Design for Secure Systems by Ka-Ping Yee.
Learning Objectives: Usable Privacy and Security
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
18
|
12 |
21
12:45–2:00 PM:
Instructor’s Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) in class assignment on usable privacy and security |
22
Topic: Case Study: Bitcoin
Before the class:
- Study 1. Introduction to Bitcoin and Blockchain Cryptography (from 20th minute of the video to the end).
- Study 2. How Bitcoin Achieves Decentralization (1h14m).
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
23 |
24
Topic: Case Study: Bitcoin
Before the class:
- Study 3. Mechanics of Bitcoin (1h20m).
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
25
|
|
|
December |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
13 |
November 28
12:45–2:00 PM:
Instructor’s Zoom Office Hours.
3-5 PM: Lab session
Topics:
1) Teams presentations of progress report on the term projects |
November 29
Topic: Case Study: Bitcoin
Before the class:
- Study 4. How to Store and Use Bitcoins (1h22m).
- Bonus Material: study 5. Bitcoin Mining
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
|
November 30
Due: Assignment 5: Usable Privacy and Security. See Canvas for submission instructions and deadline details.
9PM:
coin-mining contest ends |
December 1
Topic: Case Study: Bitcoin
Before the class:
- Study 6. Bitcoin and Anonymity (1h52m).
- Optionally, watch 7. Bitcoin Community, Politics, and Regulation.
- Optionally, watch 10. Altcoins and the Cryptocurrency Ecosystem (1h5m).
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Discussion of the material studied for this class.
- Tutorial on giving presentations.
|
2
December 2th:
Term Project Video Clips Due (See Canvas for time and submission instructions). |
14 |
5
12:45–2:00 PM:
Instructor’s Zoom Office Hours. |
6
During the class:
- Where to go from here.
- Mini-conference, term project reports, and final exam Q&A.
- Course anonymous feedback survey.
|
7 |
8 |
9
Course mini-conference with term project presentations.
Location: KAIS 2020/2030 |
15 |
12
12:45–2:00 PM:
Instructor’s Zoom Office Hours. |
13
Term Project Report Final Version Due (See Canvas for time and submission instructions). |
14
3:30 – 6 PM Final Examination |
15 |
16
|
16 |
19 |
20 |
21 |
22 |
23 |