Course detail

Security and Computer Networks

FIT-IBSAcad. year: 2018/2019

Secure Communication on the L2 Layer. Certificates and Digital Signature. Attacks in Computer Networks. Security Protocols, their Analysis, Verification and Design. Application of Security Protocols. Security on the L3 Layer. IPsec and VPN. Security of Network Services. IDS and IPS Systems. Security of Wireless Networks. Security of Sensor Networks.

Language of instruction

Czech

Number of ECTS credits

4

Mode of study

Not applicable.

Learning outcomes of the course unit

Student are able to configure secure communication between computers. They have an overview of authentication principles and secure network services and they are able to manage them: SSH, VPN, email services, etc. They have overview of security technologies used in wireless and sensor networks. Students are able to design and implement secure communication. Students are able to read standards and use them for project implementation.

Prerequisites

  • Basic skills of operation systems Unix, Windows
  • Ability to read study texts in English (standards, RFC documents).
  • Architecture of computer networks (ISO/OSI, TCP/IP).
  • Overview of link layer protocols and network layer protocols.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Not applicable.

Assesment methods and criteria linked to learning outcomes

Mid-term exam and project realization.

Exam prerequisites:
Students need to earn at least a half of all points during the semester.

Course curriculum

Not applicable.

Work placements

Not applicable.

Aims

The goal of this course is to inform students about basic principles of network and systems security and relevant protocols and standards. Students are learned to design and manage security technologies.

Specification of controlled education, way of implementation and compensation for absences

Mid-term exam and project realization.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Basic literature

Not applicable.

Recommended reading

Anderson, Ross J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons Inc, 2001, ISBN 0-471-38922-6.
Bishop, M.: Computer security: Art & Science. Addison-Wesley, Boston, 2003, ISBN 0-201-44099-7.
Kurose, James F.: Computer networking : a top-down approach. 7th ed., Pearson, Essex, 2017, ISBN 978-1-292-15359-9
Lecture notes in electronic form.
Menezes, A. J., Oorschot, P.C. van, Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7, http://www.cacr.math.uwaterloo.ca/hac/
Schneider, S.A., Ryan, P.Y.A.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston, 2000, ISBN 0-201-67471-8.
Standardy IETF RFC.
Tanenbaum, A.S.: Computer Networks. Fourth Edition, Prentice Hall, 2003, ISBN 0-13-066102-3.

Classification of course in study plans

  • Programme IT-BC-3 Bachelor's

    branch BIT , 2 year of study, summer semester, elective

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

  1. Introduction. Overview of computer security.
  2. Security of L2 layer (802.1x, PAP, CHAP).
  3. Certificates. Digital signature (PKI, TKPI). Certification authority. Authentication and authorization in computer networks AAA.
  4. Attacks in computer networks.
  5. Security protocols, their analysis and verification.
  6. Design of security protocols and their application. Payment protocols.
  7. Security of L3 layer. IPsec and VPN.
  8. Security of network services. Secure transport (SSL, TLS). Security on the application layer.
  9. Firewalls. IDS and IPS systems.
  10. Security of wireless and mobile networks. WEP, WPA.
  11. Security of sensor networks. ZigBee.
  12. Security in practice.
  13. Modern trends of networks security. Course summary.

Laboratory exercise

6 hod., compulsory

Teacher / Lecturer

Syllabus

  1. Practical analysis of security protocol.
  2. Practical implementation of secure communication.
  3. Administration of secure communication (SSH, stunel, pgp). Creation of VPN connections. Secure connections testing.

Project

7 hod., compulsory

Teacher / Lecturer

Syllabus

Practical analysis of security protocol. Practical implementation and administration of secure communication.