Students will acquire knowledge about security issues of relevant Internet protocols, with special emphasis on principles and methods of protection of information and communication infrastructure.
- identify key elements that influence the network and application security
- explain the need for the implementation of security mechanisms
- describe security methods and procedures in networks and applications
- assess network and application security
- identify security requirements of networks and applications
- analyze strengths and weaknesses of security mechanisms
Forms of Teaching
Lectures, with lecture notes and presentations available in advance on the web.Exams
Midterm exam will be held after the first lecture cycle, the final exam after the second lecture cycle. The students can also take regular exams.Laboratory Work
Laboratory exercises will be held in 5 cycles, each in extent of 3 hours.Consultations
Teaching staff is available for consultations during the whole academic year.
|Type||Threshold||Percent of Grade||Threshold||Percent of Grade|
|Laboratory Exercises||0 %||10 %||0 %||10 %|
|Mid Term Exam: Written||0 %||30 %||0 %|
|Final Exam: Written||0 %||35 %|
|Final Exam: Oral||25 %|
|Exam: Written||50 %||65 %|
|Exam: Oral||25 %|
Week by Week Schedule
- Introduction. Security threats. Security requirements for networks and services.
- Security analysis. Protection measures. Security standards, organizations and bodies. Relevant laws and recommendations.
- Cryptographic protection. Basic definitions and objectives: symmetric and asymmetric algorithms, hash functions, digital signature, key management.
- Digital certificates. Public key infrastructure (PKI). PKI components and users. Architecture.
- Operating system security. Vulnerabilities. Malware. Viruses, warms, trojans. Windows and Unix examples.
- Protection of computers and networks. Types of threats and attacks, levels of defense. Examples of internet protocols' and applications' vulnerabilities. Protection methods on the network layer.
- TCP/IP protocol stack security - network and transport layer. Protocol vulnerabilities and attacks.
- Midterm examination.
- Firewall: traffic filtering. Firewall architectures. Network address translation (NAT). Implementations. Advantages and disadvantages of various models.
- Techniques and tools for vulnerability scaning. Intrusion detection systems. Host based and network based. Hybrid systems.
- Virtual private networks: security protocols, design, advantages and disadvantages of various models.
- Security of web traffic and web servers. HTTP security. SSL.
- Web users management. Authentication. Application and browser security.
- E-mail security. S/MIME, PGP. Domain Name System.
- Final examination.