1. | Course Title | Security and Reliability of Computer Communication Systems | |||||||||||
2. | Code | 4ФЕИТ07002 | |||||||||||
3. | Study program | 7-NKS, 8-KM-INN, 20-IMSA, 21-PNMI | |||||||||||
4. | Organizer of the study program (unit, institute, department) | Faculty of Electrical Engineering and Information Technologies | |||||||||||
5. | Degree (first, second, third cycle) | Second cycle | |||||||||||
6. | Academic year/semester | I/1 | 7. | Number of ECTS credits | 6.00 | ||||||||
8. | Lecturer | Dr Danijela Efnusheva | |||||||||||
9. | Course Prerequisites | ||||||||||||
10. | Course Goals (acquired competencies):
Acquiring deeper knowledge in the field of security and reliability of computer and network environments. Application of the acquired knowledge in practical systems, such as: computer systems and different types of networks. Application of machine learning in system security implementation. Protection of critical data. Estimation of reliability in computer-communication systems. |
||||||||||||
11. | Course Syllabus:
Introduction and basic concepts. Ethical standards and accountability. Structure of encryption. Examples of encryption protocols. Encryption with secret keys. Encryption with public keys. Encrypted systems penetration. Basic protection mechanisms in operating systems. Architecture of protection systems in operating systems, authentication, access control: access lists, access control implementation (Unix, Java), Bell and La Padula models. Operating systems support for MAC policies, security policies Clark- Wilson and Chinese Wall. Weaknesses of protection in operating systems. Safe OS cores. Protective mechanisms in TCP/IP based networks and in DNS. IPsec protocol. Firewalls. Web applications and servers protection. Database protection and attacks. Virus detection, Trojan horses and unauthorized login attempts. Spam, spoofing, man-in-the-middle, DoS, DDoS agents and mobile codes. IDS/IPS systems. Application of machine learning in IDS systems. Classification, analysis and selection of different techniques for machine learning, according to the problem of detection; Protocols for secure electronic transactions. Protection of smart cards and other card types. Reliability and confidentiality definitions and measures. Reliability and availability modeling. Error detection and error correction codes. Reliable systems design: transient versus permanent hardware errors. Error sources in software. Fault tolerance techniques. VLSI devices reliability; airflow control systems, telecommunication systems, industrial control applications. Reliable systems for transaction processing. Software approaches and software reliability. Software reliability models. Software reliability methods. Reliability in operating systems and data structures. Reliability in databases and distributed systems. Test design. Test generation methods. Automatic Test Pattern Generation (ATPG). System level tests and diagnosis. Software Testing. Test specifications. Black Box Testing. White box testing. R |
||||||||||||
12. | Learning methods:
Lectures, independent learning, independent work on project tasks and preparation of seminar papers. |
||||||||||||
13. | Total number of course hours | 180 | |||||||||||
14. | Distribution of course hours | 3 + 3 | |||||||||||
15. | Forms of teaching | 15.1 | Lectures-theoretical teaching | 45 hours | |||||||||
15.2 | Exercises (laboratory, practice classes), seminars, teamwork | 45 hours | |||||||||||
16. | Other course activities | 16.1 | Projects, seminar papers | 30 hours | |||||||||
16.2 | Individual tasks | 30 hours | |||||||||||
16.3 | Homework and self-learning | 30 hours | |||||||||||
17. | Grading | ||||||||||||
17.1 | Exams | 10 points | |||||||||||
17.2 | Seminar work/project (presentation: written and oral) | 50 points | |||||||||||
17.3. | Activity and participation | 0 points | |||||||||||
17.4. | Final exam | 40 points | |||||||||||
18. | Grading criteria (points) | up to 50 points | 5 (five) (F) | ||||||||||
from 51 to 60 points | 6 (six) (E) | ||||||||||||
from 61 to 70 points | 7 (seven) (D) | ||||||||||||
from 71 to 80 points | 8 (eight) (C) | ||||||||||||
from 81 to 90 points | 9 (nine) (B) | ||||||||||||
from 91 to 100 points | 10 (ten) (A) | ||||||||||||
19. | Conditions for acquiring teacher’s signature and for taking final exam |
Regular attendance at classes and prepared seminar work. |
|||||||||||
20. | Forms of assessment |
During the semester, tests are conducted during the classes. Written exam is taken for a maximum of 120 minutes at the end of the semester or in exam sessions. A seminar paper or project task (team or individual) is prepared. The final grade includes points from the exam, tests and from the seminar paper or project assignment. A special instruction published before each exam regulates the manner of taking the exam and the use of teaching aids and electronic devices during the exam. |
|||||||||||
21. | Language | Macedonian and English | |||||||||||
22. | Method of monitoring of teaching quality | Self-evaluation | |||||||||||
23. | Literature | ||||||||||||
23.1. | Required Literature | ||||||||||||
No. | Author | Title | Publisher | Year | |||||||||
1. | William Stallings | Cryptography and Network Security: Principles and Practice 8th Edition | Pearson | 2020 | |||||||||
2. | Marvin Rausand, Anne Barros, Arnljot Hoyland | System Reliability Theory: Models, Statistical Methods, and Applications, 3rd Edition | Wiley | 2020 | |||||||||
3. | Clarence Chio, David Freeman | Machine Learning and Security: Protecting Systems with Data and Algorithms | O’Reilly Media | 2018 | |||||||||
23.2. | Additional Literature | ||||||||||||
No. | Author | Title | Publisher | Year | |||||||||
1. | Arne Mikalsen, Per Borgesen | Local Area Network Management, Design and Security: A Practical Approach | Wiley | 2002 |