Computer Systems Security


The course aims to familiarize students with the fundamentals of Computer Systems Security and problems of modern computing systems and networks, security mechanisms, intrusion detection and prevention techniques. In the laboratory, students are expected to apply the knowledge acquired in theory and gain practical experience on the use of cryptographic mechanisms and network security tools, identify vulnerabilities and threats on computer systems and networks, develop and apply security policies and protection measures.


Objectives

Upon successful completion of this course the students will be able to: • Understand the basic concepts related to multimedia technologies. • Understand the specifics, standards and technologies involving various media representation forms (text, image, sound, animation, video) and to become familiar with the basic techniques of coding tools in multimedia applications. • Become familiar with tools and specialized software for multimedia application development. • Become familiar with project management methodologies and technologies for multimedia systems development, and learn how to use them in order to ensure the successful development and integration of multimedia applications. • Distinguish the main roles in a real multimedia application development project or case study, and assess the role of stakeholders in the project. • Understand the distributed multimedia systems network requirements, and technologies for delivering multimedia applications on the Internet with guaranteed quality of service. • Identify the specific problems encountered in the development of multimedia applications and consider ways to resolve them. Cooperate with fellow students in order to develop and present an interactive multimedia application case study.


Prerequisites

There are no prerequisite courses.


Syllabus

The course covers the following topics: INTRODUCTION Basic safety principles in the area of ​​security trends, security architecture OSI, security attacks, security services, security mechanisms, network security model. PART ONE - CRYPTOGRAPHY Symmetric encryption, principles of symmetric encryption techniques of symmetric encryption symmetric parts cryptographic algorithms, modes encoders parts, flow encoders, confidentiality using symmetric encryption, placing encryption devices, distribution center keys, public key cryptography and message authentication, authentication messaging, secure hash functions and algorithms, public-key cryptography Authorities, public-key cryptography algorithms, digital signatures, key management. PART TWO - APPLICATIONS NETWORK SECURITY Applications authentication, Kerberos, X.509 certification authority, public key infrastructure, security, email, Pretty Good Privacy (PGP), S / MIME, IP Security Protocol (IPSec), overview of IPSec, IPSec architecture, authentication header AH, encapsulation cargo ESP, combination correlations security, key management, web security, web security, SSL protocols and TLS, Secure electronic transaction. PART THREE - SECURITY SYSTEMS Invaders, invasion techniques, intrusion detection (IDS), intrusion prevention (IPS), managing passwords, malware, viruses and related threats, malware countermeasures, distributed, denial of service attacks (DDos), firewalls, drawing firewalls authorities, trusted systems security evaluation criteria for information technology, security functional requirements, such security requirements, protection profiles, security targets, legal security (Computer Forensics). In the laboratory part of the course, the students have the possibility of practical application of the theory concepts using numerous exercises that extensively cover the material, and to gain experience on the use of cryptographic mechanisms, authentication and access control, network security monitoring applications and computing systems using corresponding tools and software libraries (vulnerability probes, penetration testing tools and exploitation of vulnerabilities in computer systems, intrusion detection and prevention systems, firewalls, etc.).

COURSE DETAILS

Level:

Type:

Undergraduate

(A-)


Instructors: Spyridon Nikolaou
Department: Informatics Engineering department
Institution: TEI of Western Macedonia
Subject: Computer and Information Sciences
Rights: CC - Attribution-NonCommercial-NoDerivatives

Visit Course Page

SHARE THIS COURSE
RELATED COURSES