Title:

Security and Computer Networks

Code:IBS
Ac.Year:2017/2018
Term:Summer
Curriculums:
ProgrammeBranchYearDuty
IT-BC-3BIT-Elective
IT-BC-3BIT2ndElective
Language:Czech
Private info:http://www.fit.vutbr.cz/study/courses/IBS/private/
Credits:4
Completion:accreditation+exam (written)
Type of
instruction:
Hour/semLecturesSem. ExercisesLab. exercisesComp. exercisesOther
Hours:260607
 ExaminationTestsExercisesLaboratoriesOther
Points:60200020
Guarantee:Švéda Miroslav, prof. Ing., CSc., DIFS
Lecturer:Očenášek Pavel, Ing., Ph.D., DIFS
Instructor:Očenášek Pavel, Ing., Ph.D., DIFS
Trchalík Roman, Mgr., Ph.D., DIFS
Faculty:Faculty of Information Technology BUT
Department:Department of Information Systems FIT BUT
Prerequisites: 
Computer Communications and Networks (IPK), DIFS
Network Applications and Network Administration (ISA), DIFS
Operating Systems (IOS), DITS
Schedule:
DayLessonWeekRoomStartEndLect.Gr.St.G.EndG.
ThulecturelecturesD020615:0016:502BIAxxxx
ThulecturelecturesD020615:0016:502BIBxxxx
ThulecturelecturesD020615:0016:503BITxxxx
 
Learning objectives:
  The goal of this course is to inform students about basic principles of network and systems security and relevant protocols and standards. Students are learned to design and manage security technologies.
Description:
  Secure Communication on the L2 Layer. Certificates and Digital Signature. Attacks in Computer Networks. Security Protocols, their Analysis, Verification and Design. Application of Security Protocols. Security on the L3 Layer. IPsec and VPN. Security of Network Services. IDS and IPS Systems. Security of Wireless Networks. Security of Sensor Networks.
Knowledge and skills required for the course:
  
  • Basic skills of operation systems Unix, Windows
  • Ability to read study texts in English (standards, RFC documents).
  • Architecture of computer networks (ISO/OSI, TCP/IP).
  • Overview of link layer protocols and network layer protocols.
Learning outcomes and competences:
  Student are able to configure secure communication between computers. They have an overview of authentication principles and secure network services and they are able to manage them: SSH, VPN, email services, etc. They have overview of security technologies used in wireless and sensor networks. Students are able to design and implement secure communication. Students are able to read standards and use them for project implementation.
Syllabus of lectures:
 
  1. Introduction. Overview of computer security.
  2. Security of L2 layer (802.1x, PAP, CHAP).
  3. Certificates. Digital signature (PKI, TKPI). Certification authority. Authentication and authorization in computer networks AAA.
  4. Attacks in computer networks.
  5. Security protocols, their analysis and verification.
  6. Design of security protocols and their application. Payment protocols.
  7. Security of L3 layer. IPsec and VPN.
  8. Security of network services. Secure transport (SSL, TLS). Security on the application layer.
  9. Firewalls. IDS and IPS systems.
  10. Security of wireless and mobile networks. WEP, WPA.
  11. Security of sensor networks. ZigBee.
  12. Security in practice.
  13. Modern trends of networks security. Course summary.
Syllabus of laboratory exercises:
 
  1. Practical analysis of security protocol.
  2. Practical implementation of secure communication.
  3. Administration of secure communication (SSH, stunel, pgp). Creation of VPN connections. Secure connections testing.
Syllabus - others, projects and individual work of students:
 Practical analysis of security protocol. Practical implementation and administration of secure communication.
Fundamental literature:
 
  • Stallings, W.: Cryptography and network security: principles and practice. 2nd ed., Prentice Hall, Upper Saddle River, 1999, ISBN 0-13-869017-0.
  • Schneider, S.A., Ryan, P.Y.A.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston, 2000, ISBN 0-201-67471-8.
  • Bishop, M.: Computer security: Art & Science. Addison-Wesley, Boston, 2003, ISBN 0-201-44099-7.
  • Anderson, Ross J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons Inc, 2001, ISBN 0-471-38922-6.
  • Menezes, A. J., Oorschot, P.C. van, Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7, http://www.cacr.math.uwaterloo.ca/hac/
  • Tanenbaum, A.S.: Computer Networks. Fourth Edition, Prentice Hall, 2003, ISBN 0-13-066102-3.
  • Standards IETF RFC.
Study literature:
 
  • Lecture notes in electronic form.
Controlled instruction:
  Mid-term exam and project realization.
Progress assessment:
  Mid-term exam and project realization.
Exam prerequisites:
  Students need to earn at least a half of all points during the semester.