System and Network Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
BIE-SSB | Z,ZK | 5 | 2P+2C | English |
- Relations:
- During a review of study plans, the course BIE-ADS can be substituted for the course BIE-SSB.
- Course guarantor:
- Jiří Dostál
- Lecturer:
- Jiří Dostál
- Tutor:
- Jiří Dostál
- Supervisor:
- Department of Information Security
- Synopsis:
-
The students will understand the public key infrastructure (PKI), its strengths and weaknesses, its vulnerabilities againstattacks. The students will also understand the analysis of network protocols from the perspectives of: authentication and authorisation,key exchange, and encryption. They get an overview of the security mechanisms of operating systems (OSs), of the ways virtualization canbe used to protect OSs, and of the security mechanisms for the OS memory. The students will learn basic methods of forensic analysisof storage media and networks. The students will also understand security of the networking infrastructure and its protocols andwill be able to design and implement a secured and survivable network. Students will also get an overview of securing data in clouds,database systems, and servers.
- Requirements:
- Syllabus of lectures:
-
1. Weaknesses of the PKI and attacks on the PKI.
2. Analysis of the networks protocols (authentication, authorization, key exchange and network data flow encryption).
3. OS ? security levels, virtualization (as a OS security mechanism).
4. OS memory security.
5. Forensic analysis of storage media.
6. Communication infrastructure security.
7. Network protocols security.
8. Secure and survivable planning, design, and implementation of switched network infrastructure.
9. Secure and survivable planning, design, and implementation of a routed network infrastructure.
10. Securing data in a cloud. 1Database and web servers security.
11. Monitoring of vulnerabilities in an IT infrastructure and fast reactions upon them.
- Syllabus of tutorials:
- Study Objective:
-
The students will understand the public key infrastructure (PKI), its strengths and weaknesses, its vulnerabilities againstattacks. The students will also understand the analysis of network protocols from the perspectives of: authentication and authorisation,key exchange, and encryption. They get an overview of the security mechanisms of operating systems (OSs), of the ways virtualization canbe used to protect OSs, and of the security mechanisms for the OS memory. The students will learn basic methods of forensic analysisof storage media and networks. The students will also understand security of the networking infrastructure and its protocols andwill be able to design and implement a secured and survivable network. Students will also get an overview of securing data in clouds,database systems, and servers.
- Study materials:
-
[1] Xiao, Y. - Li, F.H. - Chen, H., eds.: Handbook of Security and Networks, World Scientific Publishing Company, 2011, 978-9814273039,
[2] Sammons, J.: The Basics of Digital Forensics, Elsevier, 2012, 978-1-59749-661-2,
[3] Harris, S.: CISSP All-in-One Exam Guide, 6th Edition, International Information Systems Security Certification Consortium, 2013, 978-0071781749,
[4] Odom, W.: CCNA Routing and Switching ICND2 200-101 Official Cert Guide, Cisco Press, 2013, 978-1-58714-373-1,
- Note:
- Further information:
- https://courses.fit.cvut.cz/BI-SSB/
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Bachelor branch Security and Information Technology, in English, 2015-2020 (compulsory course of the specialization)
- Bachelor branch Web and Software Engineering, spec. Software Engineering, in English, 2015-2020 (elective course)
- Bachelor branch Computer Science, in English, 2015-2020 (elective course)
- Bachelor branch Computer Science, in English, 2015-2020 original version (elective course)