CS 444/544: Introduction to Cybersecurity

Instructors: Roya Ensafi and Jed Crandall

Office and office hours: FEC 343/335, Mondays, Wednesdays, from 9:00am to 10:30am.

Class meeting time and place: Mondays, Wednesday, and Fridays from 4:00pm to 5:00pm in Centennial Engineering Center room B146A. Attendance is required and is a part of your grade.

Syllabus: Here is the course syllabus. Read it carefully.

Mailing lists: here are two mailing lists, one list that you are required to join that only we will post on, and we will only post important class announcements to that list. There is also a chat list, which is optional but highly encouraged, for students to ask questions, get help on labs, etc. The link to join the main (required) mailing list for the course is here and the chat (optional) list is here.

Blog link: http://cs444544.blogspot.com/
Command line cheat sheet: commandlinecheatsheet.pdf(thanks to Jed)

May 9

Final Grades: here are the 444 students' grades and 544 students' grades

April 5

Final Project: here is the final project write up

April 4

Lab3: here is the lab 3 write up, read it carefully and follow the rules when submitting the summary(report). Also, here is the the first version of the game codes, (thanks to Mike)

April 3

Read these two papers(due on Wednesday April 11): Mafia: A theoretical study of players and coalitions in a partial information environment, and A mathematical model of the Mafia game

March 20

Read these 2 papers by Friday: "An Analysis of Covert Channels" and "Shared Resource Matrix Methodology".

March 19

Grades for lab 2 (part 1) for 444/544 students.

March 9

Read chapter 16,17 of Bishop book

March 7

Mafia game slides .

Feb 27

Link to Saltzer, Schroeder, and Star Wars AND the Grades for Proposal are here.

Feb 22

Read chapter 4 of Bishop book

Feb 20

Read chapter 13: "Design Principles" of Matt Bishop book

Feb 14

Grades for lab 1 (part 1 and part 2) for graduate students, and for undergraduate students.

Feb 13

Read chapter 12 of Bishop Book

Feb 9

Lab2 part one: here is the part 1 of lab 2 and due by 11:59pm, on Thursday, 23 Feburary 2012, at 11:59pm.
Final Lab: here is the FINAL PROJECT, read it as soon as possible, the due date for proposal is on Monday, 20 February 2012, at 11:59pm.

Feb 8

Explore these links and learn about computer forensics: http://staff.washington.edu/dittrich/misc/forensics/, "http://www2.opensourceforensics.org/tools", http://www.forensicswiki.org/wiki/Main_Page, http://freecode.com/projects/extcarve, ...

Feb 3

Read Chapter 10, 11 of Bishap book, https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it, also https://blog.torproject.org/blog/diginotar-damage-disclosure

Jan 30

Read Chapter 9 of Bishap book(basic crypthography chapter), and, our OPTIONAL reading which is the Tor paper (Tor:The second generation onion router)

Jan 27

Lab1 part two: Here is the part 2 of Lab 1.

Jan 23

Lab1 part one: Here is the part 1 of Lab 1.

Jan 23

Read UNM Policy 2220, Freedom of Expression and Dissent, as well as UNM Policy 2240, Respectful Campus.

Jan 20

Dorothy Denning paper: Concerning Hackers Who Break into Computer Systems, Hacker's Manifesto: The conscience of a hacker, Cory Doctorow video: The coming war on general computation