September |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
1 |
4 |
5
UBC-wide orientation.
No classes. |
6 |
7
Before the class:
- Connect to the course on Canvas.
- Learn about academic integrity by studying UBC’s Policy on Academic Misconduct, information resources provided at “Understand Academic Integrity“, and on the use of common knowledge in your writings.
- Study the course syllabus.
Learning Objectives: Academic Integrity
During the class:
- Course overview.
- Quiz on the knowledge of the course syllabus and academic integrity.
|
8 |
2 |
11 |
12
Topic: Buffer Overflow
Before the class:
- Make sure you can connect to the course on Canvas to be able to take the Entrance Quiz during the class.
- Study and prepare to be quizzed on buffer overflow:
- Vulnerability and Exploits (watch from 25:45 to the end)
- Countermeasures (watch from 24:43 to 45:48)
- Study and prepare to be quizzed on the Basics of the Economics of Cybersecurity (42m)
-
- Study A brief history (8m).
- Study Introduction to economics (10m).
- Study The economics of information goods (13m).
- Study Security from an economic perspective (11m),
- Optionally, read a detailed analysis of a buffer overflow vulnerability in an earlier version of WhatsApp.
Learning Objectives:
- Buffer Overflow
- Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Work on practice problems and questions on the material studied for this class.
- Entrance Quiz on Buffer Overflow and Basics of the Economics of Cybersecurity
|
13
|
14
Topic: Introduction to Cybersecurity
Before the class:
- Study sections 1.1-1.6 & 1.8 of Chapter 1 from Computer Security and the Internet: Tools and Jewels [CSI-TJ].
Learning Objectives: Introduction to Cybersecurity
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
1–2 PM: Instructor’s In-person (KAIS 4047) office hours. |
15
|
3 |
18 |
19
Topic: Principles of Designing Secure Systems
Before the class:
- Study section 1.7 of Section 1.7 from Computer Security and the Internet: Tools and Jewels [CSI-TJ].
Learning Objectives: Design Principles
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
20 |
21
Topic: Introduction to Cryptography (part I)
Before the class:
- Study Cryptography 101: Goals, Basics, Substitution Ciphers
- Study all micro-modules of ancient cryptography and Ciphers modules.
- Study Stamp Sections 2.1–2.3, 2.6, 2.7. Feel free to supplement the reading with Stamp video lectures on on the corresponding sections.
- Optionally, read Stamp 2.4, 2.5.
Learning Objectives: Introduction to Cryptography (part I)
During the class:
- Presentation of a term paper from a previous cohort.
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
2–3 PM: Instructor’s In-person (KAIS 4047) office hours. |
22
|
4 |
25 |
26
Topic: Introduction to Cryptography (part II)
Before class:
- Get clear understanding of confusion and diffusion properties of ciphers by studying this short explanation.
- Study Random Oracle model and its versions for hash functions, block ciphers, and stream ciphers:
- Anderson: Section 5.3 (introduction, 5.3.1, 5.3.2, 5.3.3).
- Random Oracle in Pictures.
- Study properties of hash functions: Stamp: Sections 5.1 & 5.2. Feel free to supplement the reading with a video of Stamp’s lecture on Hash Function properties.
- Bonus Material: Read Stamp 2.5 on the history of modern crypto. Ignore the explanation of confusion and diffusion there.
- Bonus Material: study Birthday Paradox and Birthday Attack. Stamp Sections 5.3, 5.4.
Learning Objectives:
- Introduction to Cryptography (part II)
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
27 |
28
Topic: Stream and Block Ciphers Under the Hood
Before the class:
(most videos are short)
- Optionally, view this gentle introduction into stream ciphers, videos 1, 2, 3,
- Study Stamp Sections 3.1 and introductory text in 3.2 (but not 3.2.1 or 3.2.2). Feel free to supplement the reading with Stamp video lectures: parts 1& 2 from Chapter 3.
- Study random number generators: video 1, and Stamp’s lecture on Random Numbers in Cryptography.
- Study required properties of block ciphers (5m).
- Study AES:
- Stamp Section 3.3.4, feel free to compliment it with viewing Stamp’s lecture on AES.
- AES animation demo (enjoy the soundtrack).
- Videos 1, 2, 5, 11, 12, 13 on the mechanics of AES.
- Bonus material: Study A5/1 cipher
- Pages 7-10 of the slides.
- Video animation of A5/1.
- Optionally, watch the rest of the video lectures on AES (3, 4, 6, 7, 8, 9, 10, 14, 15) from applied crypto playlist.
Learning Objectives: Stream and Block Ciphers Under the Hood
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
1:15–2:15 PM: Instructor’s In-person (KAIS 4047) office hours. |
29
|
|
|
October |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
5 |
2 |
3
Topic: Modes of Operation and Hash Functions
Before the class:
- modes of operation for block ciphers
- Study Stamp Section 3.3.6.
- Study modes of operations for block ciphers: ECB, CBC, and CTR, and optionally: CFB.
- MAC: Stamp Section 3.4.
- Hash functions:
- Study Non-cryptographic Hash Functions Stamp Section 5.5.
- Study Cryptographic hash functions: video Lecture 1.1 (first 21 minutes) of this video material on Cryptocurrencies.
- Optionally, watch HMAC video (from 6m12s to the end) and read Stamp Section 5.7.
Learning Objectives: Modes of Operation and Hash Functions
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
4 |
5
Topic: Asymmetric Ciphers
Before the class:
- View an introduction to Diffie-Hellman (DH) key establishment scheme with this very affordable video.
- Study Stamp Chapter 4, all sections except 4.3.2, 4.3.3, 4.5 (which are optional), and 4.11. Feel free to supplement the reading with Stamp video lectures on Chapter 4.
Learning Objectives: Public Key Cryptography
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
1:15–2:15 PM: Instructor’s In-person (KAIS 4047) office hours. |
6 |
6 |
9
Thanksgiving Day. University closed. |
10
In the class:
- Term paper proposals presentations
- Q&A about the mid-term exam
Last day to obtain authorization for third-party system security analysis from the UBC IT Security.
Due: Term Paper Proposal. See Canvas for submission instructions and deadline details. |
11 |
12
“Make-up Monday”, no Thursday classes.
12–12:50 PM: Instructor’s In-person (KAIS 4047) office hours. |
13 |
7 |
16 |
17
Mid-term exam
The exam is on all the material studied until the exam. |
18 |
19
Topic: Authentication and Key Establishment Over Insecure Networks
Before the class:
- Study Stamp Chapter 9 (except for Sections 9.5, 9.8). Feel free to supplement the reading with Stamp video lectures on Chapter 9.
- Bonus Material: Stamp Section 9.5 on Zero Knowledge Proofs.
Learning Objectives: Simplified Authentication and Key Establishment Protocols
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
1–2 PM: Instructor’s In-person (KAIS 4047) office hours. |
20
|
8 |
23 |
24
Topic: Real World Security Protocols, part I
Before the class:
- Study Stamp Sections 10.1-10.3, 10.5. You can compliment your reading with Stamp video lectures on Chapter 10.
Learning Objectives: Real World Security Protocols
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
25 |
26
Topic: Real World Security Protocols, part II
Before the class:
- Study Stamp Sections 10.6 – 10.8. You can compliment your reading with Stamp video lectures on Chapter 10.
- Study WEP vs. WPA explanation.
Learning Objectives: Real World Security Protocols
During the class:
- Quiz on the study material for the class.
- Midterm anonymous feedback for the teaching staff.
- Work on practice problems and questions on the material studied for this class.
After the class:
2–3 PM: Instructor’s In-person (KAIS 4047) office hours. |
27 |
|
|
November |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
9 |
October 30 |
October 31
Topic: Authentication of Humans to Computers
Before the class:
- Study all sections of Stamp Chapter 6 “Authentication” (Feel free to compliment your reading with Stamp video lectures on the chapter).
- Study “After-action report – learning from the mistakes we’ve made with passwords” by Dr. Cormac Herley (length: 1h13m).
Learning Objectives: Authentication of Humans to Computers
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
1 |
2
Topics: Designing and Building (More) Secure Software
Before the class:
- Study the following parts of Software Security Lecture 4:
- Security Requirements and Abuse Cases (26m46s-30m14s).
- Design Flaws (30m20s-32m46s).
- Top Design Flaws (1h07m18s-1h16m30s).
- VSFTPD case study (1h16m30s-1h27m45s).
- Bonus Material: study Web (in)Security.
Learning Objectives: Designing and Building (More) Secure Software
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
2–3 PM: Instructor’s In-person (KAIS 4047) office hours. |
3
Due: Term Paper Pre-final Draft Due (optional for non-Analysis Term Papers). See Canvas for submission instructions and deadline details. |
10 |
6 |
7
Topic: Economic, Organizational, and Political Aspects of Cybersecurity
Before the class:
Optionally refresh your memory of Part 1 (the same as for the Entrance Quiz): Basics (42m)
- Study A brief history (8m).
- Study Introduction to economics (10m).
- Study The economics of information goods (13m).
- Study Security from an economic perspective (11m).
Study the following video lectures on the economics of cybersecurity:
Part 2: Security Metrics (39m)
- Study What to measure? (9m).
- Study Measuring security levels (9m).
- Study Metrics in practice (9m).
- Study Metrics from incident data (12m).
Part 3: Security Investment and Risk Management (47m)
- Study Information security strategy (11m).
- Study Information security investment (10m).
- Study Risk management (13m).
- Study Operational security management (13m).
Learning Objectives: Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
8 |
9
Topic: Economic, Organizational, and Political Aspects of Cybersecurity
Before the class:
Study video lectures on the economics of cybersecurity (continued):
Part 4: Market Failures (43m)
- Study Market failures (12m).
- Study Policy interventions (13m).
- Study Case study 1: Information sharing in incident response (8m).
- Study Case study 2: payment card security (10m).
Part 5: Behavioural research into security & Policy Implications (38m)
- Study Prospect Theory (10m).
- Study Heuristics and social persuasion (16m),
- Study Behavioural economics of privacy (12m).
- Optionally: Consumer behaviour and deception,
- Optionally: Security economics and policy.
Learning Objectives: Economic, Organizational, and Political Aspects of Cybersecurity
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
2–3 PM: Instructor’s In-person (KAIS 4047) office hours. |
10 |
11 |
13
Midterm Break, No Classes
Remembrance Day, UBC closed. |
16
Midterm Break, No Classes
|
15
Midterm Break, No Classes |
16
Topic: Usable Privacy and Security
Before the class:
- Study 1 — Introduction (56m).
- Optionally, watch 2 — Design.
- Study 3 — Evaluating usable security design (1h13m).
- Study Neilsen’s Usability Heuristics.
Learning Objectives: Usable Privacy and Security
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
2–3 PM: Instructor’s In-person (KAIS 4047) office hours. |
17
|
12 |
20 |
21
Topic: Usable Privacy and Security
Before the class:
- Study 4 — Guidelines for Secure Interaction Design (58m).
- Study 5 –Usable Authentication (49m)
- Optionally: Read Section 3 (“Design Principles”) of User Interaction Design for Secure Systems by Ka-Ping Yee.
Learning Objectives: Usable Privacy and Security
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
22 |
23
Topic: Case Study: Bitcoin
Before the class:
- Study 1. Introduction to Bitcoin and Blockchain Cryptography (from 20th minute of the video to the end) (38 minutes).
- Study 2. How Bitcoin Achieves Decentralization (1h14m).
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
After the class:
2–3 PM: Instructor’s In-person (KAIS 4047) office hours. |
24 |
|
|
December |
Week # |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
13 |
November 27 |
November 28
Topic: Case Study: Bitcoin
Before the class:
- Study 3. Mechanics of Bitcoin (1h20m).
- Study 4. How to Store and Use Bitcoins (1h22m).
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
|
November 29 |
November 30
Topic: Case Study: Bitcoin
Before the class:
- Study 6. Bitcoin and Anonymity (1h52m).
- Optionally, watch 7. Bitcoin Community, Politics, and Regulation.
- Optionally, watch 10. Altcoins and the Cryptocurrency Ecosystem (1h5m).
- Optionally: watch 5. Bitcoin Mining
Learning Objectives: Case Study: Bitcoin
During the class:
- Quiz on the study material for the class.
- Work on practice problems and questions on the material studied for this class.
- Tips on giving presentations of the term papers.
- Where to go from here.
- Mini-conference, term project reports, and final exam Q&A.
- Course anonymous feedback survey.
After the class:
2–3 PM: Instructor’s In-person (KAIS 4047) office hours. |
December 1
|
14 |
4 |
5
During the class:
Term project presentations. |
6
|
7
Term Paper Final Version Due (See Canvas for time and submission instructions). |
8
|
15 |
11
|
12
Final exam 12:00-2:30 PM |
13
|
14 |
15
|
16 |
18 |
19 |
20 |
21 |
22 |