1. Course Title | Security and Protection of Computer Communication Systems and Networks | |||||||
2. Code | 4ФЕИТ07Л002 | |||||||
3. Study program | КТИ,КХИЕ | |||||||
4. Organizer of the study program (unit, institute, department) | Faculty of Electrical Engineering and Information Technologies | |||||||
5. Degree (first, second, third cycle) | First cycle | |||||||
6. Academic year/semester | III/6, IV/8 | 7. Number of ECTS credits | 6 | |||||
8. Lecturer | D-r Danijela Efnusheva | |||||||
9. Course Prerequisites | Taken course: Computer Networks | |||||||
10. Course Goals (acquired competencies): Introduction to the basic principles of security in computer-communication systems and networks, cryptography, security of computer systems, applications and users and secure network communication. Upon completion of the course students will be able to: – understand and use the basic cryptographic concepts: symmetric and asymmetric encryption; – design secure computer networks by applying message and user authentication, network access control, as well as network, transport and application level security; – design of secure computer systems using intrusion detection systems, firewalls and various mechanisms for protection of malicious behavior; |
||||||||
11. Course Syllabus: Basic principles of security in computer-communication systems and networks. Computer security concepts. Security attacks, services and mechanisms. Symmetric encryption with private key. Algorithms for symmetric encryption: DES, 3DES, AES и RC4. Message confidentiality. Public-key cryptography. Algorithms for public-key cryptography: RSA, Diffie–Hellman, DSS and Elliptic curve. Digital signatures. Message authentication. Secure hash functions. User authentication and key distribution. Kerberos. Key distribution using symmetric or asymmetric encryption. X.509 certificates. Network access control. IEEE 802.1.X standard. Cloud systems security. Web security. Secure protocols: TLS, HTTPS and SSH. Wireless network security. Email security. DNS security. Secure protocols: S/MIME, PGP, DNSSEC, SPF, DKIM, DMARC and DANE. IP security. IPSec protocol: authentication header and encapsulation security payload. Computer systems security. Malicious software: viruses, warms, Trojan horses, spam messages, bot nets, spyware, fishing attacks, back door attacks etc. Intrusion detection systems. An overview of the most common attacks. Mechanisms for protection. Honeypots. Firewalls. Types of firewalls. | ||||||||
12. Learning methods: Lectures, tasks and exercises and laboratory practice | ||||||||
13. Total number of course hours | 2 + 2 + 1 + 0 | |||||||
14. Distribution of course hours | 180 | |||||||
15. Forms of teaching | 15.1. Lectures-theoretical teaching | 30 | ||||||
15.2. Exercises (laboratory, practice classes), seminars, teamwork | 45 | |||||||
16. Other course activities | 16.1. Projects, seminar papers | 0 | ||||||
16.2. Individual tasks | 25 | |||||||
16.3. Homework and self-learning | 80 | |||||||
17. Grading | 17.1. Exams | 0 | ||||||
17.2. Seminar work/project (presentation: written and oral) | 0 | |||||||
17.3. Activity and participation | 10 | |||||||
17.4. Final exam | 90 | |||||||
18. Grading criteria (points) | up to 50 points | 5 (five) (F) | ||||||
from 51to 60 points | 6 (six) (E) | |||||||
from 61to 70 points | 7 (seven) (D) | |||||||
from 71to 80 points | 8 (eight) (C) | |||||||
from 81to 90 points | 9 (nine) (B) | |||||||
from 91to 100 points | 10 (ten) (A) | |||||||
19. Conditions for acquiring teacher’s signature and for taking final exam | Practical (laboratory) exercises | |||||||
20. Forms of assessment | Two partial exams during the semester with a duration of 120 minutes each or one final exam in a corresponding exam session with a duration of 120 minutes. The laboratory exercises are also graded. The final grade includes points from the exam and the laboratory exercises. It is not allowed to use books, scripts, manuscripts or notes of any kind during the exam, as well as a calculator, mobile phone, tablet or any other electronic device. |
|||||||
21. Language | Macedonian and English | |||||||
22. Method of monitoring of teaching quality | Self-evaluation and questionnaires | |||||||
23. Literature | ||||||||
23.1. Required Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | W. Stallings | network security essentials: applications and standards 6th ed | Pearson | 2017 | ||||
2 | W. Stallings | Cryptography and Network Security: Principles and Practice, 8th Ed. | Pearson | 2020 | ||||
3 | Joseph Migga Kizza | Guide to Computer Network Security | Springer | 2017 | ||||
23.2. Additional Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | William Stallings, Lawrie Brown | Computer Security: Principles and Practice 4th Ed | Pearson | 2018 | ||||
2 | William Chuck Easttom | Computer Security Fundamentals, 3rd ed | Pearson | 2016 | ||||
3 | Eric Cole | Network Security Bible 2nd Ed | Wiley | 2009 |