Communication Security

Course Description

TCP / IP security issues. Security and vulnerability of operating systems. Security of distributed systems. Web traffic security. Computer and Network Protection: Types of Threats and Attacks, Defense Levels. The problem of malicious resource congestion. Security protocols. Virtual private networks. Firewall: traffic filtering, network address mapping (NAT). Public Key Infrastructure. Security standards.

Learning Outcomes

  1. assess security of communication network
  2. design security mechanisms to protect communication network
  3. design security mechanism to protect application data while in transit

Forms of Teaching

Lectures

Independent assignments

Laboratory

Week by Week Schedule

  1. Security threats; Security requirements for networks and services; Security analysis; Protection measures; Security standards, organizations, and bodies; Relevant laws and recommendations, Cryptographic protection; Basic definitions and objectives: symmetric and asymmetric algorithms, hash functions, digital signature, and key management, Digital certificates; Public key infrastructure (PKI); PKI components and users
  2. Protection of computers and networks; Types of threats and attacks (e.g., denial of service, spoofing, sniffing and traffic redirection, man-in-the-middle, message integrity attacks, routing attacks, and traffic analysis), levels of defense; Case studies focused on vulnerabilities of Internet protocols and applications; Protection methods on the network layer
  3. TCP/IP protocol stack security: network and transport layer; Protocol vulnerabilities and attacks
  4. Firewall: traffic filtering; Firewall architectures; Network address translation (NAT)
  5. Techniques and tools for vulnerability scaning; Intrusion detection systems; Host-based, network-based approaches, and hybrid approaches
  6. Virtual private networks (VPNs): security protocols, design, and advantages and disadvantages of various models
  7. Defense mechanisms and countermeasures (e.g., network monitoring, intrusion detection, firewalls, spoofing and DoS protection, honeypots, tracebacks)
  8. Midterm exam
  9. Operational network security management (e.g., configure network access control)
  10. Data link layer security
  11. Wireless network security
  12. Security in mobile networks
  13. Security of web traffic and web servers; Hypertext Transfer Protocol (HTTP) security; Secure Sockets Layer (SSL); Web users' management; Authentication (e.g., single sign-on, HTTPS and certificates); Application and browser security; Session management; Application vulnerabilities and defenses (SQL injection, XSS, CSRF); Client side security (cookies, HTTPS, plugins, user tracking, same origin policy); Server-side security tools (e.g., Web Application Firewalls (WAFs) and fuzzers); Content security policies, E-mail security; Secure/Multipurpose Internet Mail Extensions (S/MIME), Pretty Good Privacy (PGP); Domain Name System (DNS)
  14. Guest Lecturer from Industry - overview of current procedures and practices
  15. Final exam

Study Programmes

University graduate
Audio Technologies and Electroacoustics (profile)
Free Elective Courses (2. semester)
Communication and Space Technologies (profile)
Free Elective Courses (2. semester)
Computational Modelling in Engineering (profile)
Free Elective Courses (2. semester)
Computer Engineering (profile)
Free Elective Courses (2. semester)
Computer Science (profile)
Elective Courses of the Profile (2. semester)
Control Systems and Robotics (profile)
Free Elective Courses (2. semester)
Data Science (profile)
Free Elective Courses (2. semester)
Electrical Power Engineering (profile)
Free Elective Courses (2. semester)
Electric Machines, Drives and Automation (profile)
Free Elective Courses (2. semester)
Electronic and Computer Engineering (profile)
Free Elective Courses (2. semester)
Electronics (profile)
Free Elective Courses (2. semester)
Information and Communication Engineering (profile)
Free Elective Courses (2. semester)
Network Science (profile)
Core-elective courses (2. semester)
Software Engineering and Information Systems (profile)
Free Elective Courses (2. semester)

Literature

(.), W. Stallings (1999.), Network Security Essentials: Applications and Standards, Prentice Hall,
(.), Chapman, D. Brent, Cooper, Simon, Russell, Deborah, and Zwicky, Elizabeth D (2000.), Building Internet Firewalls (2nd edition), O'Reilly and Associates,
(.), Man Young Rhee (2003.), Internet Security, John Wiley & Sons,
(.), Jyrki T. J. Penttinen: Wireless Communications Security: Solutions for the Internet of Things, Wiley, 2016,

For students

General

ID 222776
  Summer semester
5 ECTS
L3 English Level
L1 e-Learning
30 Lectures
12 Laboratory exercises