Security and Reliability of Computer Communication Systems

Објавено: June 26, 2023
1. Course Title Security and Reliability of Computer Communication Systems
2. Code 4ФЕИТ07002
3. Study program 7-NKS, 8-KM-INN, 20-IMSA, 21-PNMI
4. Organizer of the study program (unit, institute, department) Faculty of Electrical Engineering and Information Technologies
5. Degree (first, second, third cycle) Second cycle
6. Academic year/semester I/1   7.    Number of ECTS credits 6.00
8. Lecturer Dr Danijela Efnusheva
9. Course Prerequisites
10. Course Goals (acquired competencies):

Acquiring deeper knowledge in the field of security and reliability of computer and network environments. Application of the acquired knowledge in practical systems, such as: computer systems and different types of networks. Application of machine learning in system security implementation. Protection of critical data. Estimation of reliability in computer-communication systems.

11. Course Syllabus:

Introduction and basic concepts. Ethical standards and accountability. Structure of encryption. Examples of encryption protocols. Encryption with secret keys. Encryption with public keys. Encrypted systems penetration. Basic protection mechanisms in operating systems. Architecture of protection systems in operating systems, authentication, access control: access lists, access control implementation (Unix, Java), Bell and La Padula models. Operating systems support for MAC policies, security policies Clark- Wilson and Chinese Wall. Weaknesses of protection in operating systems. Safe OS cores. Protective mechanisms in TCP/IP based networks and in DNS. IPsec protocol. Firewalls. Web applications and servers protection. Database protection and attacks. Virus detection, Trojan horses and unauthorized login attempts. Spam, spoofing, man-in-the-middle, DoS, DDoS agents and mobile codes. IDS/IPS systems. Application of machine learning in IDS systems. Classification, analysis and selection of different techniques for machine learning, according to the problem of detection; Protocols for secure electronic transactions. Protection of smart cards and other card types.  Reliability and confidentiality definitions and measures. Reliability and availability modeling. Error detection and error correction codes. Reliable systems design: transient versus permanent hardware errors. Error sources in software. Fault tolerance techniques. VLSI devices reliability; airflow control systems, telecommunication systems, industrial control applications. Reliable systems for transaction processing. Software approaches and software reliability. Software reliability models. Software reliability methods. Reliability in operating systems and data structures. Reliability in databases and distributed systems. Test design. Test generation methods. Automatic Test Pattern Generation (ATPG). System level tests and diagnosis. Software Testing. Test specifications. Black Box Testing. White box testing. R

12. Learning methods:

Lectures, independent learning, independent work on project tasks and preparation of seminar papers.

13. Total number of course hours 180
14. Distribution of course hours 3 + 3
15. Forms of teaching 15.1 Lectures-theoretical teaching 45 hours
15.2 Exercises (laboratory, practice classes), seminars, teamwork 45 hours
16. Other course activities 16.1 Projects, seminar papers 30 hours
16.2 Individual tasks 30 hours
16.3 Homework and self-learning 30 hours
17. Grading
17.1 Exams 10 points
17.2 Seminar work/project (presentation: written and oral) 50 points
17.3. Activity and participation 0 points
17.4. Final exam 40 points
18. Grading criteria (points) up to 50 points 5 (five) (F)
from 51 to 60 points 6 (six) (E)
from 61 to 70 points 7 (seven) (D)
from 71 to 80 points 8 (eight) (C)
from 81 to 90 points 9 (nine) (B)
from 91 to 100 points 10 (ten) (A)
19. Conditions for acquiring teacher’s signature and for taking final exam

Regular attendance at classes and prepared seminar work.

20. Forms of assessment

During the semester, tests are conducted during the classes. Written exam is taken for a maximum of 120 minutes at the end of the semester or in exam sessions. A seminar paper or project task (team or individual) is prepared. The final grade includes points from the exam, tests and from the seminar paper or project assignment. A special instruction published before each exam regulates the manner of taking the exam and the use of teaching aids and electronic devices during the exam.

21. Language Macedonian and English
22. Method of monitoring of teaching quality Self-evaluation
23. Literature
23.1.       Required Literature
No. Author Title Publisher Year
1. William Stallings Cryptography and Network Security: Principles and Practice 8th Edition Pearson 2020
2. Marvin Rausand, Anne Barros, Arnljot Hoyland System Reliability Theory: Models, Statistical Methods, and Applications, 3rd Edition Wiley 2020
3. Clarence Chio, David Freeman Machine Learning and Security: Protecting Systems with Data and Algorithms O’Reilly Media 2018
23.2.       Additional Literature
No. Author Title Publisher Year
1.  Arne Mikalsen, Per Borgesen  Local Area Network Management, Design and Security: A Practical Approach  Wiley  2002