Basics of System Security
Kód | Zakončení | Kredity | Rozsah | Jazyk výuky |
---|---|---|---|---|
BIE-ZSB.21 | Z,ZK | 5 | 2P+2C | anglicky |
- Garant předmětu:
- Róbert Lórencz
- Přednášející:
- Simona Fornůsek, Marián Svetlík
- Cvičící:
- Jiří Buček, Simona Fornůsek, Marián Svetlík, Martin Šutovský
- Předmět zajišťuje:
- katedra informační bezpečnosti
- Anotace:
-
The goal of the course is to provide introduction to basic concepts in security of computer systems. Further, the course introduces the basics of forensic analysis and related topics such as malware analysis or incident response. After finishing the course student will get both theoretical and practical knowledge in the area of modern operating systems security, as well as skills needed for independent work in the area of operating system security incident analysis.
- Požadavky:
-
The course has no initial knowledge requirements.
- Osnova přednášek:
-
1. Introduction to systems security, definition of basic terms, system security requirements.
2. Operating systems security – threat model, security concepts.
3. Operating systems security – secure design, role of OS in security.
4. Memory and CPU architecture attacks (Meltdown, Spectre).
5. Access control in operating systems.
6. Introduction to forensic analysis, terminology, methodology, applications.
7. Forensic analysis – data acquisition.
8. Forensic analysis of file systems and its artefacts.
9. Security incident response.
10. Malware analysis (online services, static analysis, dynamic analysis).
11. Vulnerability management and Patch management.
12. Business Continuity Management.
13. Disaster Recovery.
- Osnova cvičení:
-
1. Security features in OS Windows
2. Security features in OS Linux, SELinux
3. Access control in Linux and Windows
4. Meltdown & Spectre attacks
6. Basics of forensics analysis
7. File system forensic analysis, MFT extraction and analysis
8. Practical malware analysis
- Cíle studia:
- Studijní materiály:
-
1. Anderson R. : Security engineering - A Guide to building dependable distributed systems (2nd Edition). John Wiley & Sons, 2008. ISBN 978-0470068526.
2. Perla E. : A Guide to Kernel Exploitation: Attacking the Core. Syngress, 2010. ISBN 978-1597494861.
3. Arnes A. : Digital Forensics. John Wiley & Sons, 2017. ISBN 978-1119262381.
4. Stallings W., Brown L. : Computer Security: Principles and Practice, Global Edition (4th Edition). Pearson, 2018. ISBN 978-1292220611.
5. Anson S. : Applied Incident Response. John Wiley & Sons, 2020. ISBN 978-1119560265.
- Poznámka:
-
Chybí vstupní znalostní požadavky
- Rozvrh na zimní semestr 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Po Út St Čt Pá - Rozvrh na letní semestr 2024/2025:
- Rozvrh není připraven
- Předmět je součástí následujících studijních plánů:
-
- Bachelor Specialization, Information Security, 2021 (PS)
- Bachelor Specialization, Software Engineering, 2021 (VO)
- Bachelor Specialization, Computer Science, 2021 (VO)
- Bachelor Specialization, Computer Networks and Internet, 2021 (VO)
- Bachelor Specialization Computer Systems and Virtualization, 2021 (PS)
- Bachelor Specialization, Computer Engineering, Version 2024 (VO)