Detailed schedule and class resources

Class 1 (Tuesday, January 22): Password-cracking lab.

We take a brief look at the syllabus, but defer discussion until next time.

We discuss an overview of the course.

Most of the class is spent on the password-cracking lab.

Homework questions:

Class 2 (Thursday, January 24): Password security

Required reading:

Optional reading:

Lecture notes: password-security-v2.pdf.

Homework questions:

Class 3 (Tuesday, January 29): Information security basics

Required reading:

Lecture notes: info-security-basics-v3.pdf.

Homework questions (note: answer all questions in your own words, without looking at any material while you are typing out the answer; do not copy the answer from the reading or any other source):

Class 4 (Thursday, January 31): Cyber war overview, part 1

Required reading:

The class consists of a discussion of Chapters 1-4 of CK. Specifically, we will split into groups, and each group is assigned one of the four chapters. Each group will come up with a list of the main points from its chapter, together with any interesting questions about the chapter (and especially any points on which you disagree with the authors). The randomly-generated list of the discussion groups is available. The first person listed in each group (in bold) is responsible for chairing the discussion (20 minutes), and for presenting the results (10 minutes) to the class when we reassemble. If the group leader is absent, this responsibility goes to the next person on the list.

Homework questions:

Some interesting optional reading: an article in yesterday's New York Times -- thanks to Andrew Chesley for pointing this out; as he says, it "detail[s] extensive hacking of their systems by Chinese hackers since they published their investigation into Wen Jiabao's family in October." Here's another recent news report that is highly relevant to today's class: US Cyber Command in 'fivefold' staff expansion (BBC)

Class 5 (Tuesday, February 5): Symmetric key cryptography

Required reading:

Homework assignment 1 is due at the start of class today. This assignment consists of all homework questions for classes 1-4 inclusive. As stated on the syllabus, solutions must be typed and submitted in hard copy, except where stated otherwise.

Lecture notes for today: symmetric-key-crypto-v1.pdf.

Some resources for the class:

Homework questions:

Class 6 (Thursday, February 7): Public-key cryptography

Required reading:

Lecture notes for today: public-key-crypto-v1.pdf; additional examples are available on the public key crypto handout, cryptography-examples-v3.pdf.

YouTube video by Chris Bishop, demonstrating a key exchange algorithm using physical keys and padlocks. In fact, the algorithm demonstrated here is not analogous to the Diffie-Hellman scheme we study in class -- but it is a very interesting example of the surprising types of secure communication that are possible over a public channel.

Homework questions:

Class 7 (Tuesday, February 12): Digital signatures

Required reading:

Lecture notes for today: digital-signatures-v1.pdf.

Homework questions:

Class 8 (Thursday, February 14): Cryptography Lab

Today's class will take place in Tome 118, opposite our regular classroom.

Required reading:

Today's class is devoted to the cryptography lab.

Lab partners have been assigned randomly. These pairings will be altered as necessary; please notify the instructor if you were assigned the same partner as in the previous lab or if your partner is absent.

Homework assignment 2a is due at the start of class today. This assignment consists of all homework questions for classes 5-7 inclusive. As stated on the syllabus, solutions must be typed and submitted in hard copy, except where stated otherwise.

Homework questions:

Class 9 (Tuesday, February 19): Cyber war overview, part 2

Required reading:

There is another extraordinarily relevant article on the front page of the New York Times today!: Chinese Army Unit Is Seen as Tied to Hacking Against U.S..

Homework assignment 2b is due at the start of class today. This assignment consists of just the homework questions for class 8. As stated on the syllabus, solutions must be typed and submitted in hard copy, except where stated otherwise.

The class consists of a discussion of Chapters 5-8 and the appendix of CK. Specifically, we will split into groups, and each group is assigned one of the four chapters. Each group will come up with a list of the main points from its chapter, together with any interesting questions about the chapter (and especially any points on which you disagree with the authors). The randomly-generated list of the discussion groups is available. The first person listed in each group (in bold) is responsible for chairing the discussion (20 minutes), and for e-mailing the results to the instructor (group leaders will not present results at the whiteboard this time). If the group leader is absent, this responsibility goes to the next person on the list.

Notes summarizing the second half of the book are available: cyberwar-overview-II-v1.pdf.

Homework questions (all refer to Clarke and Knake; explain each answer with a one- or two-sentence justification):

Class 10 (Thursday, February 21): Theory of cyber power

Required reading:

Lecture notes for today: demchak-notes-v1.pdf.

Homework question: Give a one- or two-paragraph answer of 100-150 words to the following question.

Class 11 (Tuesday, February 26): Exam 1

Exam 1.

Class 12 (Thursday, February 28): deterrence of cyber attacks

Required reading:

Lecture notes for today: deterrence-notes-v1.pdf.

Homework questions:

Class 13 (Tuesday, March 5): Cyber terrorism

Required reading:

Optional reading:

Homework questions (these questions all relate to the required reading above, by Irving Lachow):

Class 14 (Thursday, March 7): Software vulnerabilities I

No required reading.

Lecture notes for today: vulnerabilities-v2.pdf.

Example programs accompanying today's lecture: vulnerabilities-examples.zip.

Homework questions:

Class 15 (Tuesday, March 19): Software vulnerabilities II

No required reading:

Lecture notes for today: vulnerabilitiesII-v2.pdf.

Homework questions:

Class 16 (Thursday, March 21): Software vulnerabilities lab

No required reading.

Class will consist of working through the software vulnerabilities lab.

Homework questions for today are all embedded in the lab linked above.

Class 17 (Tuesday, March 26): Cyber security of critical infrastructure

Required reading:

Lecture notes for today: infrastructure-notes-v1.pdf.

At the start of class, please fill out the midsemester survey.

Here are links to the two YouTube clips shown in class:

Homework questions (all refer to today's reading by O'Neil):

Class 18 (Thursday, March 28): Ed Amoroso visit

Today's class consists of a presentation by Dr. Ed Amoroso (author, Dickinson alum and Chief Security Officer for AT&T).

No required reading.

Homework questions:

Class 19 (Tuesday, April 2): Robotic warfare

Required reading:

Optional:

Homework questions:

Class 20 (Thursday, April 4):

No class.

Class 21 (Tuesday, April 9): Operating system and file security

Required reading: none.

Lecture notes for today: os-security-notes-v2.pdf.

Homework questions:

Class 22 (Thursday, April 11): Network security

Required reading: none.

Lecture notes for today: network-security-notes-v1.pdf.

Homework questions:

Class 23 (Tuesday, April 16): File and network security lab

Required reading: none.

Homework questions: the homework questions are embedded in today's lab.

Class 24 (Thursday, April 18): Cyber crime

Required reading:

No notes from today's class are available, but the class discussions will be based on the above readings together with the following papers, which can be regarded as optional reading:

Our shared document listing types of cyber crime.

Homework questions:

Class 25 (Tuesday, April 23): International law issues

Required reading:

Homework questions:

Class 26 (Thursday, April 25): Exam 2

Exam 2.

Class 27 (Tuesday, April 30): Final paper workshop, media discussion, and course overview

Required reading: none, but you must bring to class your latest draft and/or outline of your final paper, so that one of your classmates can read your work and offer suggestions on it.

Paper workshop partners

Homework questions:

Class 28 (Thursday, May 2): Final paper workshop, media discussion, and course overview

Required reading: none, but you must bring to class your latest draft and/or outline of your final paper, so that one of your classmates can read your work and offer suggestions on it.

Homework questions: