Basics of System Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
BIE-ZSB.21 | Z,ZK | 5 | 2P+2C | English |
- Course guarantor:
- Róbert Lórencz
- Lecturer:
- Simona Fornůsek, Marián Svetlík
- Tutor:
- Jiří Buček, Simona Fornůsek, Marián Svetlík, Martin Šutovský
- Supervisor:
- Department of Information Security
- Synopsis:
-
The goal of the course is to provide introduction to basic concepts in security of computer systems. Further, the course introduces the basics of forensic analysis and related topics such as malware analysis or incident response. After finishing the course student will get both theoretical and practical knowledge in the area of modern operating systems security, as well as skills needed for independent work in the area of operating system security incident analysis.
- Requirements:
-
The course has no initial knowledge requirements.
- Syllabus of lectures:
-
1. Introduction to systems security, definition of basic terms, system security requirements.
2. Operating systems security – threat model, security concepts.
3. Operating systems security – secure design, role of OS in security.
4. Memory and CPU architecture attacks (Meltdown, Spectre).
5. Access control in operating systems.
6. Introduction to forensic analysis, terminology, methodology, applications.
7. Forensic analysis – data acquisition.
8. Forensic analysis of file systems and its artefacts.
9. Security incident response.
10. Malware analysis (online services, static analysis, dynamic analysis).
11. Vulnerability management and Patch management.
12. Business Continuity Management.
13. Disaster Recovery.
- Syllabus of tutorials:
-
1. Security features in OS Windows
2. Security features in OS Linux, SELinux
3. Access control in Linux and Windows
4. Meltdown & Spectre attacks
6. Basics of forensics analysis
7. File system forensic analysis, MFT extraction and analysis
8. Practical malware analysis
- Study Objective:
- Study materials:
-
1. Anderson R. : Security engineering - A Guide to building dependable distributed systems (2nd Edition). John Wiley & Sons, 2008. ISBN 978-0470068526.
2. Perla E. : A Guide to Kernel Exploitation: Attacking the Core. Syngress, 2010. ISBN 978-1597494861.
3. Arnes A. : Digital Forensics. John Wiley & Sons, 2017. ISBN 978-1119262381.
4. Stallings W., Brown L. : Computer Security: Principles and Practice, Global Edition (4th Edition). Pearson, 2018. ISBN 978-1292220611.
5. Anson S. : Applied Incident Response. John Wiley & Sons, 2020. ISBN 978-1119560265.
- Note:
- Time-table for winter semester 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Wed Thu Fri - Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Bachelor Specialization, Information Security, 2021 (PS)
- Bachelor Specialization, Software Engineering, 2021 (VO)
- Bachelor Specialization, Computer Science, 2021 (VO)
- Bachelor Specialization, Computer Networks and Internet, 2021 (VO)
- Bachelor Specialization Computer Systems and Virtualization, 2021 (PS)
- Bachelor Specialization, Computer Engineering, Version 2024 (VO)