System Security and Forensics
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
NIE-SBF | Z,ZK | 5 | 2P+1C | English |
- Course guarantor:
- Simona Fornůsek
- Lecturer:
- Simona Fornůsek, Marián Svetlík, Tomáš Zahradnický
- Tutor:
- Jiří Buček, Simona Fornůsek, Marián Svetlík, Tomáš Zahradnický
- Supervisor:
- Department of Information Security
- Synopsis:
-
Students will be introduced to various aspects of system security (principles of endpoint security, principles of security policies, security models, authentication concepts). Students will also learn about forensic analysis as a tool for investigating security incidents (techniques used by malicious software or attackers, forensic analysis techniques, and the importance of memory or file system artifacts for attack analysis and detection).
- Requirements:
-
No prerequisites
- Syllabus of lectures:
-
1. Security of information systems, security policies.
2. Security models and modeling.
3. Authentication: Management of encryption keys and certificates, secure local and remote authentication.
4. Authentication: Authentication protocols, Kerberos.
5. Security of distributed services and cloud.
6. Forensics: Introduction.
7. Forensics: Forensic imaging.
8. Forensics: File systems analysis, Data Carving.
9. Forensics: Volatile memory.
10. Forensics: Information and residual data, activities of OS, applications and users.
11. Security of terminal stations.
12. Cyber attacks, methods and classification.
13. Security of Distributed Services - Internet of Things (IoT)
- Syllabus of tutorials:
-
1. Malware Analysis - basics
2. File System Artifacts
3. Memory Analysis
4. Windows Registry
5. Residual user data & artefacts in Windows OS
- Study Objective:
- Study materials:
-
1. Carvey, H. : Investigating Windows Systems. Academic Press, 2018. ISBN 978-0128114155.
2. Vacca, J. R. : Network and System Security (2nd Edition). Syngress, 2013. ISBN 978-0124166899.
3. Kim, D. - Solomon, M. : Fundamentals of Information Systems Security. Jones & Bartlett Learning, 2012. ISBN 987-0-7637-9025-7.
4. Stallings, W. : Cryptography and Network Security: Principles and Practice (5th Edition). Prentice Hall, 2010. ISBN 0-13-869017-0.
5. Anderson, R. : Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2008. ISBN 0470068523.
- Note:
- Time-table for winter semester 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Wed Thu Fri - Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Master specialization Software Engineering, in English, 2021 (elective course)
- Master specialization Computer Security, in English, 2021 (PS)
- Master specialization Computer Systems and Networks, in English, 2021 (elective course)
- Master specialization Design and Programming of Embedded Systems, in English, 2021 (elective course)
- Master specialization Computer Science, in English, 2021 (VO)
- Master specialization Computer Science, in English, 2024 (VO)