1. |
Course Title | Security and Reliability of Computer Communication Systems | ||||||||||||||||
2. | Code | 4ФЕИТ07002А | ||||||||||||||||
3. | Study program | Dedicated Embedded Computer Systems and Internet of Things | ||||||||||||||||
4. | Organizer of the study program (unit, institute, department) | Faculty of Electrical Engineering and Information Technologies
Ss. Cyril and Methodius University in Skopje |
||||||||||||||||
5. | Degree (first, second, third cycle) | Second cycle | ||||||||||||||||
6. | Academic year/semester | Year | I | Semester | 1 | |||||||||||||
7. | Workload measured by number of ECTS credits | 6 | ||||||||||||||||
8. | Lecturer (In case of several lecturers to note the responsible one) | Dr. Danijela Efnusheva | ||||||||||||||||
9. | Language of teaching | Macedonian and English | ||||||||||||||||
10. | Course Prerequisites | None | ||||||||||||||||
11. | Course Goals (acquired competencies) and study results:
Acquiring deeper knowledge in the field of security and reliability of computer and network environments. Application of the acquired knowledge in practical systems, such as: computer systems and different types of networks. Application of machine learning in system security implementation. Protection of critical data. Estimation of reliability in computer-communication systems.After the competition of the course the students would be capable to understand the architecture and the implementation of security and reliability in computer communication systems. |
|||||||||||||||||
12. | Course Syllabus (with Chapters) and study results for each chapter:
|
|||||||||||||||||
13. | Interconnection of Courses: This course looks into the concepts of system and network protection and security, basing its new concepts on the elements from: Wireless Technologies and Networks for Internet of Things, Dedicated and contemporary computer networks, Internet of Things and IoT Standards and Protocols. On the other hand, its concepts are further developed in courses like: Design of Smart IoT Devices, Coding Theory, Secure Communications and Blockchain Technologies, Numerical Methods in Stochastic Processes. | |||||||||||||||||
14. | Detailed description of teaching and work methods:
Lectures, independent learning, independent work on project tasks and preparation of seminar papers. |
|||||||||||||||||
15. | Total number of course hours | 180 | ||||||||||||||||
16.
|
Forms of teaching
|
16.1 | Lectures-theoretical teaching | 45 hours
|
||||||||||||||
16.2 | Exercises (laboratory, practice classes), seminars, teamwork | 45 hours
|
||||||||||||||||
16.3 | Practical work (hours): | 20 hours | ||||||||||||||||
17.
|
Other course activities
|
17.1 | Projects, seminar papers | 45 hours | ||||||||||||||
17.2 | Individual tasks | 0 hours | ||||||||||||||||
17.3 | Homework and self-learning | 25 hours | ||||||||||||||||
18. | Conditions for acquiring teacher’s signature and for taking final exam: 60% of all required course activities | |||||||||||||||||
19. | Grading | |||||||||||||||||
19.1 | Quizzes | 30 points | ||||||||||||||||
19.2 | Seminar work/project (presentation: written and oral) | 50 points | ||||||||||||||||
19.3 | Final Exam | 20 points | ||||||||||||||||
20. | Grading criteria (points) | up to 50 points | 5 (five) (F) | |||||||||||||||
from 51 to 60 points | 6 (six) (E) | |||||||||||||||||
from 61 to 70 points | 7 (seven) (D) | |||||||||||||||||
from 71 to 80 points | 8 (eight) (C) | |||||||||||||||||
from 81 to 90 points | 9 (nine) (B) | |||||||||||||||||
from 91 to 100 points | 10 (ten) (A) | |||||||||||||||||
21. | Method of monitoring of teaching quality | Self-evaluation and student surveys | ||||||||||||||||
22. | Literature | |||||||||||||||||
22.1. | Required Literature | |||||||||||||||||
No. | Author | Title | Publisher | Year | ||||||||||||||
1. | William Stallings | Cryptography and Network Security: Principles and Practice 8th Edition | Pearson | 2020 | ||||||||||||||
2. | Marvin Rausand, Anne Barros, Arnljot Hoyland | System Reliability Theory: Models, Statistical Methods, and Applications, 3rd Edition | Wiley | 2020 | ||||||||||||||
3. | Clarence Chio, David Freeman | Machine Learning and Security: Protecting Systems with Data and Algorithms | O’Reilly Media | 2018 | ||||||||||||||
22.2. | Additional Literature | |||||||||||||||||
No. | Author | Title | Publisher | Year | ||||||||||||||
1. | Arne Mikalsen, Per Borgesen | Local Area Network Management, Design and Security: A Practical Approach | Wiley | 2002 |