Introduction to Computer Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
01ZPB | Z | 2 | 1+1 | Czech |
- Garant předmětu:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Mathematics
- Synopsis:
-
1. Designing secure systems
2. Secure programming techniques
3. Static code analysis
4. Buffer overflow
5. Protocols for secure communication
6. Building reliable network services
7. Securing operation systems
- Requirements:
- Syllabus of lectures:
- Syllabus of tutorials:
- Study Objective:
-
Acquired knowledge:
Get familiar with thread modeling, common attacks originating from insecure code and techniques for achieving security. Learn security features provided by operating system to run securely untrustworthy computer code.
Acquired skills:
Design, implement and operate secure computer systems.
- Study materials:
-
Compulsory literature:
[1] Akritidis, Periklis, Manuel Costa, et al.: Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors, USENIX Security Symposium, August 2009
[2] Neuman B.C., Ts?o T.: Kerberos: An authentication service for computer networks, IEEE Communications Magazine, September 1994
[3] Loscocco P., Smalley S.: Integrating Flexible Support for Security Policies into the Linux Operating System, Proceedings of the FREENIX, June 2001
Optional literature:
[1] Howard M., LeBlanc M.: Writing Secure Code (2nd Edition), Microsoft Press, 2002
[2] Wheeler D.: Secure Programming HOWTO, 2015
[3] Rosenberg J., Remy D.: Securing web service with WS-security, SAMS, May 2004
[4] Russinovich M., Solomon D., Ionescu A.: Windows Internals (6th Edition), Microsoft Press, 2012
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans: