Security of the information and communication systems
Study programs
Teaching information
Teaching form
Lecture, Seminar, Numerical exercisesStudy method
AttendanceLanguage
slovenskýHours per week (full-time)
2,1,1Hours per semester (part-time)
ZS 26,13,13Teachers
prof. Ing. Miloš Drutarovský, CSc.
Schedule
Learning outcomes
By completing subject student will get extended knowledge about methods, algorithms, protocols and tools used for maintaining privacy, integrity, authenticity, availability and non-repudiation of data origin in information and communication systems. Gets overview about types of attacks, selected countermeasures and testing tools used for design, implementation and testing in such areas as computer security, network security and security of different types of telecommunication and sensor networks.
Course outline
1. Information security, basic concepts, principles and contexts 2. Symmetric encryption, data security, authenticated encryption 3. Asymmetric encryption, data integrity and authentication 4. Security of operating systems, MS Windows, Unix 5. Software security, cryptographic libraries 6. Security in TCP/IP architecture I 7. Security in TCP/IP architecture II 8. Security of wireless networks and IoT devices 9. Post-quantum cryptography 10. Side-channel attacks 11. E-voting, Block-chain and cryptocurrencies 12. Forensic and penetration analysis, Trends in evolution of information security
Completion conditions
Assessment and completion of the course: Credit test and examination Continuous assessment: Student passes the continuous assessment and receives credits when he or she meets the requirement to obtain at least 21% out of 40%. Credit test Final assessment: Student passes the final assessment and passes the examination when he or she meets the requirement to obtain at least 31% out of 60%. Examination Overall assessment: Overall assessment is the sum of the assessments obtained by students in the assessment period. The overall result is determined in accordance with the internal regulations of the Technical University in Košice. (Study Regulations, the internal regulation principles of doctoral studies)
Recommended literature
1. Du, W., Computer a Internet Security A Hands-on Approach, 2019 2. Levický, D., Aplikovaná kryptografia, od utajenia správ ku kybernetickej bezpečnosti. Elfa, Košice, 2018 3. Drutarovský, M., Kryptografia pre vstavané procesorové systémy. Technická univerzita v Košiciach, 2017 4. Stallings, W., Cryptography and Network Security, Pearson, 2017 5. Stallings, W. – Brown, L., Computer Security Principles and Practices, Pearson, 2018
Notes
To successfully complete the course, it is necessary to obtain a credit and successfully pass the exam. This includes the student's participation in educational activities of direct teaching, lectures, exercises, as well as independent study and independent creative activity of the student in processing the semester assignment / assignments, project on a specified topic, to a specified extent, in a specified design of a total of 180 hours intensity of the student's work per semester.
Grade distribution
Total graded students: 257