Computer Security

Course Description

The goal of the course is to introduce students to computer security and to give them overview of the problems as well as the solutions used in this area. The goal is also to teach students to think about security so that in their professional work they will design, build and maintain secure systems.

Learning Outcomes

  1. explain basic terms and concepts in computer security
  2. describe types of security threats and attacks and most common defense mechanisms
  3. describe the properties of most common cryptographic primitives
  4. explain the role of the public key infrastructure and the TLS protocol
  5. apply basic concepts of defensive programming
  6. describe basic principles of digital forensics
  7. implement an simple exploit of a vulnerable system

Forms of Teaching

Lectures

Laboratory

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 20 % 20 % 20 % 0 %
Mid Term Exam: Written 30 % 40 % 0 %
Final Exam: Written 30 % 40 %
Exam: Written 50 % 70 %
Exam: Oral 30 %

Week by Week Schedule

  1. Introduction. Basic concepts and introduction into security.
  2. Introduction to cryptography. Classical cryptography. Symmetrical ciphers and AES.
  3. Modes of encryption. Stream ciphers. Cryptanalysis of block ciphers. Hash functions and message integrity codes. Asymmetric ciphers.
  4. Vulnerabilities. Threats and threat sources.
  5. Threats and threat sources. Malware.
  6. Access control. Software security.
  7. Operating systems security. Web security.
  8. Midterm exam
  9. Software security. Network Security.
  10. Network security.
  11. Network security.
  12. Overview of other areas of security.
  13. What's next.
  14. AMA (Ask me anything predavanje).
  15. Final exam

Study Programmes

University undergraduate
(6. semester)

Literature

(.), L. Budin, M. Golub, D. Jakobović, L. Jelenković. Operacijski sustavi. Izdavač Element. Prvo izdanje 2010, drugo izdanje 2011, treće izdanje 2013. ISBN 978-953-197-610-7.,
(.), Hal Tipton, Mickie Krause, Consulting Editors, Information Security Management Handbook, CRC Press LLC, ISBN: 0849374952, 6. izdanje 2007.,

Laboratory exercises

For students

General

ID 183503
  Summer semester
4 ECTS
L0 English Level
L1 e-Learning
45 Lectures
0 Seminar
0 Exercises
12 Laboratory exercises
0 Project laboratory

Grading System

88 Excellent
75 Very Good
63 Good
50 Sufficient