Chris Pollett > Old Classes > CS166
( Print View )

Student Corner:
  [Grades Sec3]

  [Submit Sec3]

  [Class Sign Up Sec3]

  [
Lecture Notes]
  [Discussion Board]

Course Info:
  [Texts & Links]
  [Topics/Outcomes]
  [Outcomes Matrix]
  [Grading]
  [HW/Quiz Info]
  [Exam Info]
  [Regrades]
  [Honesty]
  [Additional Policies]
  [Announcements]

HW Assignments:
  [Hw1]  [Hw2]  [Hw3]
  [Hw4]  [Quizzes]

Practice Exams:
  [Mid 1]  [Mid 2]  [Final]

                           












Learning Outcomes versus Collected Course Materials
LO1LO2LO3LO4LO5LO6LO7LO8LO9LO10LO11N/A
HW1XX
HW2X
MT1P1X
MT1P2X
MT1P3X
MT1P4X
MT1P5X
HW3XXXX
MT2P1X
MT2P2X
MT2P3X
MT2P4X
MT2P5X
HW4XXXXX

Within the class there were two versions of a given test; however, these two versions were just problem permutations of each other. The results above are all for the first of these two permutations. The two classes each had different tests which were variants of each other, testing the same learning outcomes.

LO1 (Learning Outcome 1) -- Understand the basics concepts of cryptography as illustrated by a classic cipher system such as the simple substitution or double transposition; demonstrate an elementary cryptanalytic attack on such a system and quantify the expected work factor.

LO2 -- Understand the implementation of modern symmetric ciphers such as RC4, DES and TEA; understand public key cryptosystems such as RSA, Diffie-Hellman and the knapsack; understand the implementation of a hash function, such as Tiger.

LO3 -- Understand the methods used to verify passwords as well as the inherent weaknesses of passwords; quantify the expected work to crack passwords under various assumptions; understand the strengths and weaknesses of biometric authentication.

LO4 -- Understand Lampson's access control matrix and its relationship to access control lists and capabilities; understand the confused deputy problem and how to prevent it.

LO5 -- Understand basic security issues in authentication and key establishment protocols, including, for example, replay attacks and their prevention.

LO6 -- Analyze authentication and key establishment protocols for potential security flaws, and demonstrate attacks on flawed protocols.

LO7 -- Understand certain widely used security protocols, including SSL, IPSec and Kerberos; understand the limitations and security issues related to these protocols.

LO8 -- Understand the role that software flaws play in security; understand the buffer overflow attack and various ways to prevent it; exploit a simple buffer overflow condition; understand race conditions.

LO9 -- Understand different types of malicious software (malware) including viruses, worms and Trojan horses; understand the details of the Morris Worm, and at least one modern virus or worm, such as Code Red or Slammer; understand the methods used to prevent and detect malware attacks.

LO10 -- Understand software reverse engineering and the security threat that it poses; implement a simple reverse engineering attack.

LO11 -- Understand the role that operating systems plays in security and the need for a trusted OS; understand the principles of a trusted OS.

N/A -- Important material covered in the course but not directly related to a specific learning outcome.