Internet Security
Course Description
TCP/IP security problems. Operating system security and vulnerability. Distributed systems security. Web traffic and Web server security. Computer and network protection: common threats and attacks, layers of defense. Denial-of-service attacks. Network discovery/vulnerability scanning: techniques and tools. Intrusion detection systems. Security protocols. Virtual private networks. Data protection. Firewalls: traffic filtering and network address translation (NAT). Risk analysis and security policy. Public Key Infrastructure. Security standards.
General Competencies
Students will acquire knowledge about security issues of relevant Internet protocols, with special emphasis on principles and methods of protection of information and communication infrastructure.
Learning Outcomes
- identify key elements that influence the network and application security
- explain the need for the implementation of security mechanisms
- describe security methods and procedures in networks and applications
- assess network and application security
- identify security requirements of networks and applications
- analyze strengths and weaknesses of security mechanisms
Forms of Teaching
Lectures
Lectures, with lecture notes and presentations available in advance on the web.
ExamsMidterm exam will be held after the first lecture cycle, the final exam after the second lecture cycle. The students can also take regular exams.
Laboratory WorkLaboratory exercises will be held in 5 cycles, each in extent of 3 hours.
ConsultationsTeaching staff is available for consultations during the whole academic year.
Grading Method
Continuous Assessment | Exam | |||||
---|---|---|---|---|---|---|
Type | Threshold | Percent of Grade | Threshold | Percent of Grade | ||
Laboratory Exercises | 0 % | 10 % | 0 % | 10 % | ||
Mid Term Exam: Written | 0 % | 30 % | 0 % | |||
Final Exam: Written | 0 % | 35 % | ||||
Final Exam: Oral | 25 % | |||||
Exam: Written | 50 % | 65 % | ||||
Exam: Oral | 25 % |
Week by Week Schedule
- Introduction. Security threats. Security requirements for networks and services.
- Security analysis. Protection measures. Security standards, organizations and bodies. Relevant laws and recommendations.
- Cryptographic protection. Basic definitions and objectives: symmetric and asymmetric algorithms, hash functions, digital signature, key management.
- Digital certificates. Public key infrastructure (PKI). PKI components and users. Architecture.
- Operating system security. Vulnerabilities. Malware. Viruses, warms, trojans. Windows and Unix examples.
- Protection of computers and networks. Types of threats and attacks, levels of defense. Examples of internet protocols' and applications' vulnerabilities. Protection methods on the network layer.
- TCP/IP protocol stack security - network and transport layer. Protocol vulnerabilities and attacks.
- Midterm examination.
- Firewall: traffic filtering. Firewall architectures. Network address translation (NAT). Implementations. Advantages and disadvantages of various models.
- Techniques and tools for vulnerability scaning. Intrusion detection systems. Host based and network based. Hybrid systems.
- Virtual private networks: security protocols, design, advantages and disadvantages of various models.
- Security of web traffic and web servers. HTTP security. SSL.
- Web users management. Authentication. Application and browser security.
- E-mail security. S/MIME, PGP. Domain Name System.
- Final examination.
Study Programmes
University graduate
Computer Science (profile)
Recommended elective courses
(3. semester)
Information Processing (profile)
Recommended elective courses
(3. semester)
Software Engineering and Information Systems (profile)
Specialization Course
(1. semester)
(3. semester)
Telecommunication and Informatics (profile)
Specialization Course
(1. semester)
(3. semester)
Literature
Laboratory exercises
General
ID 127418
Winter semester
4 ECTS
L1 English Level
L1 e-Learning
30 Lectures
0 Exercises
12 Laboratory exercises
0 Project laboratory
Grading System
90 Excellent
80 Very Good
70 Good
50 Acceptable