Security and Protection of Computer Communication Systems and Networks

Објавено: June 28, 2022
1. Course Title Security and Protection of Computer Communication Systems and Networks
2. Code 4ФЕИТ07Л002
3. Study program КТИ,КХИЕ
4. Organizer of the study program (unit, institute, department) Faculty of Electrical Engineering and Information Technologies
5. Degree (first, second, third cycle) First cycle
6. Academic year/semester III/6, IV/8 7. Number of ECTS credits 6
8. Lecturer D-r Danijela Efnusheva
9. Course Prerequisites Taken course: Computer Networks
10. Course Goals (acquired competencies): Introduction to the basic principles of security in computer-communication systems and networks, cryptography, security of computer systems, applications and users and secure network communication. Upon completion of the course students will be able to:
– understand and use the basic cryptographic concepts: symmetric and asymmetric encryption;
– design secure computer networks by applying message and user authentication, network access control, as well as network, transport and application level security;
– design of secure computer systems using intrusion detection systems, firewalls and various mechanisms for protection of malicious behavior;
11. Course Syllabus: Basic principles of security in computer-communication systems and networks. Computer security concepts. Security attacks, services and mechanisms. Symmetric encryption with private key. Algorithms for symmetric encryption: DES, 3DES, AES и RC4. Message confidentiality. Public-key cryptography. Algorithms for public-key cryptography: RSA, Diffie–Hellman, DSS and Elliptic curve. Digital signatures. Message authentication. Secure hash functions. User authentication and key distribution. Kerberos. Key distribution using symmetric or asymmetric encryption. X.509 certificates. Network access control. IEEE 802.1.X standard. Cloud systems security. Web security. Secure protocols: TLS, HTTPS and SSH. Wireless network security. Email security. DNS security. Secure protocols: S/MIME, PGP, DNSSEC, SPF, DKIM, DMARC and DANE. IP security. IPSec protocol: authentication header and encapsulation security payload. Computer systems security. Malicious software: viruses, warms, Trojan horses, spam messages, bot nets, spyware, fishing attacks, back door attacks etc. Intrusion detection systems. An overview of the most common attacks. Mechanisms for protection. Honeypots. Firewalls. Types of firewalls.
12. Learning methods: Lectures, tasks and exercises and laboratory practice
13. Total number of course hours 2 + 2 + 1 + 0
14. Distribution of course hours 180
15. Forms of teaching 15.1. Lectures-theoretical teaching 30
15.2. Exercises (laboratory, practice classes), seminars, teamwork 45
16. Other course activities 16.1. Projects, seminar papers 0
16.2. Individual tasks 25
16.3. Homework and self-learning 80
17. Grading 17.1. Exams 0
17.2. Seminar work/project (presentation: written and oral) 0
17.3. Activity and participation 10
17.4. Final exam 90
18. Grading criteria (points) up to 50 points 5 (five) (F)
from 51to 60 points 6 (six) (E)
from 61to 70 points 7 (seven) (D)
from 71to 80 points 8 (eight) (C)
from 81to 90 points 9 (nine) (B)
from 91to 100 points 10 (ten) (A)
19. Conditions for acquiring teacher’s signature and for taking final exam Practical (laboratory) exercises
20. Forms of assessment Two partial exams during the semester with a duration of 120 minutes each or one final exam in a corresponding exam session with a duration of 120 minutes. The laboratory exercises are also graded. The final grade includes points from the exam and the laboratory exercises.
It is not allowed to use books, scripts, manuscripts or notes of any kind during the exam, as well as a calculator, mobile phone, tablet or any other electronic device.
21. Language Macedonian and English
22. Method of monitoring of teaching quality Self-evaluation and questionnaires
23. Literature
23.1. Required Literature
No. Author Title Publisher Year
1 W. Stallings network security essentials: applications and standards 6th ed Pearson 2017
2 W. Stallings Cryptography and Network Security: Principles and Practice, 8th Ed. Pearson 2020
3 Joseph Migga Kizza Guide to Computer Network Security Springer 2017
23.2. Additional Literature
No. Author Title Publisher Year
1 William Stallings, Lawrie Brown Computer Security: Principles and Practice 4th Ed Pearson 2018
2 William Chuck Easttom Computer Security Fundamentals, 3rd ed Pearson 2016
3 Eric Cole Network Security Bible 2nd Ed Wiley 2009