| Week | Date | Time | Activity | Description |
|---|---|---|---|---|
| 1 | 31 Aug | 08.00-10.00 | Lecture (RIS): | Introduction, PP 1 [Lecture Slides: (PDF)]; User Authentication, PP 4.5 [Lecture Slides: (PDF)]. |
| 10.15-12.00 | Exercises: | Exercise sheet 1. | ||
| 13.00-15.00 | Lab work: | Lab. 0: Passwords. NB: This lab will take place in the G-databar in Building 308 rooms 14, 15 and 16. |
||
| 15.15-17.00 | Lecture (RIS): | Program Security, PP3 [Lecture Slides: (PDF)]. |
||
| 2 | 07 Sep | 08.00-10.00 | Lecture (RRH): | Secure Programming [Lecture Slides: (PDF)]. |
| 10.15-12.00 | Lab work: | Lab. 1: Secure Programming
Lint. (mandatory) Download splint executable. |
||
| 13.00-15.00 | Guest lecture: | Christian Probst, DTU Language Based Security at DTU Describes ongoing efforts within the language based security group at IMM. [Lecture Slides: (PDF)] |
||
| 15.15-17.00 | Exercises: | There will be no exercises this week. The time should instead be used to write up the Lab 1 report, which is to be handed in on Friday 9 September. | ||
| 3 | 14 Sep | 08.00-10.00 | Lecture (RRH): | Applications of Cryptography: illustrated through the use of PGP. |
| 10.15-12.00 | Lab.work: | Lab 2: Pretty Good Privacy (mandatory) | ||
| 13.00-15.00 | Guest lecture: | Steen Pedersen, IMM, DTU Security at DTU |
||
| 15.15-17.00 | Exercises: | Feedback on Lab 1 | ||
| 4 | 21 Sep | 08.00-10.00 | Lab work: | Lab. 2: Pretty Good Privacy (2) |
| 10.15-12.00 | Guest lecture: | Jan Pathuel Utilising Biometrics |
||
| 13.00-15.00 | Lecture (RRH): | Symmetric Cryptography: principles, algorithms,
and modes. PP 2.1-2.6,
10.1-10.2 [Lecture Slides: (PDF)] |
||
| 15.15-17.00 | Exercises: | PP Ex. 2.13-2.15, 2.18-2.20,2.30-2.31, 10.5, 10.11-10.12 | ||
| 5 | 28 Sep | 08.00-10.00 | Lab.work: | Lab. 3: Cryptography in Practice (voluntary) Introduction to using cryptography with Java. Evaluation form. |
| 10.15-12.00 | Guest lecture: | Allan Pletner Smart card and USB tokens in the real world - markets and opportunities |
||
| 13.00-15.00 | Lecture (RRH): | Asymmetric Cryptography: principles (RSA),
signatures (RSA), certificates, CA/PKI. PP 2.7-2.8, 10.3, pp. 436-439 (PKI and Certificates) |
||
| 15.15-17.00 | Exercises: | PP ex. 2.31, 10.13, 10.20, 10.21 | ||
| 6 | 05 Oct | 08.00-10.00 | Lecture (RIS): | Protection in Operating Systems, PP4, PP5.4. |
| 10.15-12.00 | Exercises: | OS protection. | ||
| 13.00-15.00 | Lecture (CDJ): | Access Control, PP5. [Lecture Slides: (PDF)] |
||
| 15.15-17.00 | Exercises: | Exercises relating to access control | ||
| 7 | 12 Oct | 08.00-10.00 | Lab.work: | Lab. 4: Authentication and Access Control (mandatory) Introduction to authentication and access control in distributed systems using Kerberos. The API of the Java Kerberos System. [Lecture Slides: (PDF)] |
| 10.15-12.00 | Guest lecture: | Bo Nygaard Sørensen, DBI Physical security |
||
| 13.00-15.00 | Lecture (CDJ): | Advanced Access Control. The Lectures will be based on the following references: Role-Based Access Control Models Using the KeyNote Trust Management System Supplemental reading Role-Based Access Control KeyNote [Lecture Slides: (PDF)] |
||
| 15.15-17.00 | Exercises: | There will be no theoretical exercises today. You are instead expected to read the RFC that describes The Kerberos Network Authentication Service (V5). | ||
| - | 19 Oct | Autumn holiday | ||
| 8 | 26 Oct | 08.00-10.00 | Lab.work: | Lab. 4: Authentication and Access Control (2) |
| 10.15-12.00 | Guest lecture: | Freddie Drewsen, FOFT (Danish
Defence Research Organization) Virus, worms and other malware. |
||
| 13.00-15.00 | Lecture (SC): | Network Security (1), PP7. | ||
| 15.15-17.00 | Exercises: | PP Ex. 7.3, 7.5, 7.8, 7.10, 7.11, 7.18-7.20, 7.24, 7.27. | ||
| 9 | 02 Nov | 08.00-10.00 | Lab.work: | Lab. 5: Auditing (mandatory) |
| 10.15-12.00 | Guest lecture: | Morten Schiønning,
DK-CERT Incident Response. |
||
| 13.00-15.00 | Lecture (SC): | Network Security (2), PP7. | ||
| 15.15-17.00 | Exercises: | PP Ex. 7.32, 7.33, 7.37, 7.44, 7.45, 7.47, 7.54, 7.57, 7.59, 7.62. | ||
| 10 | 09 Nov | 08.00-10.00 | Lab.work: | Lab. 5: Auditing (2) |
| 10.15-12.00 | Guest lecture: | Henrik Udsen, University of Copenhagen Legal aspects of digital signatures |
||
| 13.00-15.00 | Lecture (CDJ): | Administering Security, PP8. | ||
| 15.15-17.00 | Exercises: | PP ex. 8.2, 8.5, 8.6, 8.8, 8.10, 8.13, 8.14. | ||
| 11 | 16 Nov | 09.00-10.45 | Lecture (RIS): | Legal Issues, PP9. |
| 11.00-12.00 | Discussion of report projects. | |||
| 13.00-17.00 | Report project | |||
| 12 | 23 Nov | 08.00-17.00 | Report project | No lectures. |
| 13 | 30 Nov | 08.00-17.00 | Report project | No lectures. |