Course detail
Security and Computer Networks
FIT-IBSAcad. year: 2018/2019
Secure Communication on the L2 Layer. Certificates and Digital Signature. Attacks in Computer Networks. Security Protocols, their Analysis, Verification and Design. Application of Security Protocols. Security on the L3 Layer. IPsec and VPN. Security of Network Services. IDS and IPS Systems. Security of Wireless Networks. Security of Sensor Networks.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
- Basic skills of operation systems Unix, Windows
- Ability to read study texts in English (standards, RFC documents).
- Architecture of computer networks (ISO/OSI, TCP/IP).
- Overview of link layer protocols and network layer protocols.
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Exam prerequisites:
Students need to earn at least a half of all points during the semester.
Course curriculum
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
- recommended prerequisite
Operating Systems - recommended prerequisite
Computer Communications and Networks - recommended prerequisite
Network Applications and Network Administration
Basic literature
Recommended reading
Bishop, M.: Computer security: Art & Science. Addison-Wesley, Boston, 2003, ISBN 0-201-44099-7.
Kurose, James F.: Computer networking : a top-down approach. 7th ed., Pearson, Essex, 2017, ISBN 978-1-292-15359-9
Lecture notes in electronic form.
Menezes, A. J., Oorschot, P.C. van, Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7, http://www.cacr.math.uwaterloo.ca/hac/
Schneider, S.A., Ryan, P.Y.A.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston, 2000, ISBN 0-201-67471-8.
Standardy IETF RFC.
Tanenbaum, A.S.: Computer Networks. Fourth Edition, Prentice Hall, 2003, ISBN 0-13-066102-3.
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
- Introduction. Overview of computer security.
- Security of L2 layer (802.1x, PAP, CHAP).
- Certificates. Digital signature (PKI, TKPI). Certification authority. Authentication and authorization in computer networks AAA.
- Attacks in computer networks.
- Security protocols, their analysis and verification.
- Design of security protocols and their application. Payment protocols.
- Security of L3 layer. IPsec and VPN.
- Security of network services. Secure transport (SSL, TLS). Security on the application layer.
- Firewalls. IDS and IPS systems.
- Security of wireless and mobile networks. WEP, WPA.
- Security of sensor networks. ZigBee.
- Security in practice.
- Modern trends of networks security. Course summary.
Laboratory exercise
Teacher / Lecturer
Syllabus
- Practical analysis of security protocol.
- Practical implementation of secure communication.
- Administration of secure communication (SSH, stunel, pgp). Creation of VPN connections. Secure connections testing.
Project
Teacher / Lecturer
Syllabus