Course detail
Communication System Security
FEKT-MPC-BKSAcad. year: 2020/2021
Modern civilization depends on a correct functioning of information systems. Significant attention must therefore be paid to the security of these systems. On completing the course, students will have a thorough overview of possible methods of securing an information system. Lectures are mainly dedicated to explaining the functioning of cryptography protections, communication protections, access control techniques, and computer protections. Exercises are computational ones and are dedicated to strengthening the theoretical knowledge and to considering quantitatively the different types of protection.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
• explain the principles of symmetric cryptosystems,
• explain the principles of asymmetric cryptosystems,
• explain the principles of the functioning of communication protections,
• explain the principles of the functioning of access control systems,
• explain the principles of the functioning of computer protections,
• explain the principles of emission protections,
• explain the principles of security evaluation.
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
1. Basic terms.
2. Symmetric cryptosystems.
3. Asymmetric cryptosystems.
4. Protocols for secure communication.
5. Codes for error detection and correction.
6. Protection of communication channels.
7. Hidding communication.
8. Access control.
9. Computer security.
10. Data backup.
11. Information security evaluation.
12. Emission security.
13. Reserve.
Computational exercises:
1. Exercise to the secrecy theory.
2. Exercise to symmetric cryptosystems.
3. Exercise to asymmetric cryptosystems.
4. Exercise to cryptography computations.
5. Exercise to codes for error detection and correction.
6. Exercise to communication channel protections.
7. Exercise to the hidding communication.
8. Exercise to access control systems.
9. Exercise to ECC techniques.
10. Exercise to data backups.
11. Exercise to the information security evaluation.
12. Credit exercise.
13. Reserve.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Recommended reading
ROSS J. A.: Security Engineering. Wiley Publishing, Indianopolis, 2008. (EN)
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Symmetric cryptosystems.
3. Asymmetric cryptosystems.
4. Secure communications protocols.
5. Emission security.
6. Error codes.
7. Protections of communications channels.
8. Filtering methods, intrusion detection systems.
9. Access control methods.
10. Computer security.
11. Physical protections.
12. Security management in information systems.
13. Security evaluations of information systems.
Fundamentals seminar
Teacher / Lecturer
Syllabus
2. Applications of symmetric cryptography.
3. Applications of asymmetric cryptography.
4. Applications of secure communication protocols.
5. Applications of emission security.
6. Applications of error codes.
7. Applications of spread spectrum methods.
8. Applications of communications controls.
9. Applications of access methods.
10. Applications of software protections.
11. Physical security in practice.
12. Risk management in practice.
13. Applications of ISO 15408.