Internet Security

Course Description

TCP/IP security problems. Operating system security and vulnerability. Distributed systems security. Web traffic and Web server security. Computer and network protection: common threats and attacks, layers of defense. Denial-of-service attacks. Network discovery/vulnerability scanning: techniques and tools. Intrusion detection systems. Security protocols. Virtual private networks. Data protection. Firewalls: traffic filtering and network address translation (NAT). Risk analysis and security policy. Public Key Infrastructure. Security standards.

General Competencies

Students will acquire knowledge about security issues of relevant Internet protocols, with special emphasis on principles and methods of protection of information and communication infrastructure.

Learning Outcomes

  1. identify key elements that influence the network and application security
  2. explain the need for the implementation of security mechanisms
  3. describe security methods and procedures in networks and applications
  4. assess network and application security
  5. identify security requirements of networks and applications
  6. analyze strengths and weaknesses of security mechanisms

Forms of Teaching


Lectures, with lecture notes and presentations available in advance on the web.


Midterm exam will be held after the first lecture cycle, the final exam after the second lecture cycle. The students can also take regular exams.

Laboratory Work

Laboratory exercises will be held in 5 cycles, each in extent of 3 hours.


Teaching staff is available for consultations during the whole academic year.

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 0 % 10 % 0 % 10 %
Mid Term Exam: Written 0 % 30 % 0 %
Final Exam: Written 0 % 35 %
Final Exam: Oral 25 %
Exam: Written 50 % 65 %
Exam: Oral 25 %

Week by Week Schedule

  1. Introduction. Security threats. Security requirements for networks and services.
  2. Security analysis. Protection measures. Security standards, organizations and bodies. Relevant laws and recommendations.
  3. Cryptographic protection. Basic definitions and objectives: symmetric and asymmetric algorithms, hash functions, digital signature, key management.
  4. Digital certificates. Public key infrastructure (PKI). PKI components and users. Architecture.
  5. Operating system security. Vulnerabilities. Malware. Viruses, warms, trojans. Windows and Unix examples.
  6. Protection of computers and networks. Types of threats and attacks, levels of defense. Examples of internet protocols' and applications' vulnerabilities. Protection methods on the network layer.
  7. TCP/IP protocol stack security - network and transport layer. Protocol vulnerabilities and attacks.
  8. Midterm examination.
  9. Firewall: traffic filtering. Firewall architectures. Network address translation (NAT). Implementations. Advantages and disadvantages of various models.
  10. Techniques and tools for vulnerability scaning. Intrusion detection systems. Host based and network based. Hybrid systems.
  11. Virtual private networks: security protocols, design, advantages and disadvantages of various models.
  12. Security of web traffic and web servers. HTTP security. SSL.
  13. Web users management. Authentication. Application and browser security.
  14. E-mail security. S/MIME, PGP. Domain Name System.
  15. Final examination.

Study Programmes

University graduate
[FER2-HR] Computer Science - profile
Recommended elective courses (3. semester)
[FER2-HR] Information Processing - profile
Recommended elective courses (3. semester)
[FER2-HR] Software Engineering and Information Systems - profile
Specialization Course (1. semester) (3. semester)
[FER2-HR] Telecommunication and Informatics - profile
Specialization Course (1. semester) (3. semester)


W. Stallings (1999.), Network Security Essentials: Applications and Standards, Prentice Hall
Man Young Rhee (2003.), Internet Security, John Wiley & Sons
Chapman, D. Brent, Cooper, Simon, Russell, Deborah, and Zwicky, Elizabeth D (2000.), Building Internet Firewalls (2nd edition), O'Reilly and Associates

Laboratory exercises

For students


ID 127418
  Winter semester
L1 English Level
L1 e-Learning
30 Lectures
0 Seminar
0 Exercises
12 Laboratory exercises
0 Project laboratory

Grading System

90 Excellent
80 Very Good
70 Good
50 Acceptable