Degree programme field of study



Pobieranie 26.22 Kb.
Data29.04.2016
Rozmiar26.22 Kb.
SYLLABUS



COURSE TITLE

Security of Computer Systems

Faculty/Institute

Institute of computer science

COURSE CODE




DEGREE PROGRAMME

FIELD OF STUDY

Degree LEVEL

Forma studiów/STUDY MODE

Computer Science

1

Full time




COURSE FORMAT




YEAR AND SEMESTER

year II, semester IV

Name of the teacher

Przemysław Pardel, PhD, Eng

COURSE OBJECTIVES

Learning the practical aspects of the security systems and educational dangers and threats caused by the safety violation in these systems.

PREREQUISITES

Algorithms and data structures, object oriented programming, software engineering.


LEARNING OUTCOMES

KNOWLEDGE:

A good knowledge of computer security, knowledge of the origins, challenges and prospects of the development of the area.



SKILLS:

Student can independently develop a specification of the problem, schedule, select the methods and tools leading to its dissolution.



COURSE ORGANISATION –LEARNING FORMAT AND NUMBER OF HOURS

Lecture - 30 hours

Laboratory - 30 hours





COURSE DESCRIPTION

Theme of the lecture:

  • Introduction to computer security.

  • Basic definitions and problems.

  • General properties of information security.

  • The basic elements of cryptography.

  • Basic problems of computer network security.

  • The basic operating system security issues.

  • Application security and network services.

  • Legal aspects of information systems.


Subject laboratory:

  • Reverse engineering - the risks and security

  • Viruses, anti-viruses

  • Cryptography with symmetric key and asymmetric - java

  • History of cryptography (java), cryptography in php and mysql, steganography in the examples

  • Tools to take control of your computer

  • Security of operating systems

  • Archiving and backup

  • Secure programming

  • Examples of the use of session variables in applications

  • Applications data encryption

  • VPN tunnels

  • Safety at the workplace




METHODS OF INSTRUCTION

Lectures, Laboratory

REQUIREMENTS AND ASSESSMENTS

  • Implementation of presentation, movie and project issues relating to laboratory

  • The examination of the knowledge of information systems security issues




GRADING SYSTEM

The examination from the laboratory is based on the project prepared implementing the selected solution to the problem of computer systems security. The project consists of the development of applications implementing the selected solution to the problem, describing the presentation of the problem, and film. Examination is positive, the student made ​​all the components project according to the specificities of the problem.





TOTAL STUDENT WORKLOAD NEEDED TO ACHIEVE EXPECTED LEARNING OUTCOMES EXPRESSED

IN TIME AND ECTS CREDIT POINTS

Lecture – 30 hours

Laboratory – 30 hours

Participation in consultation – 10 hours

Preparing for class – 35 hours


ECTS – 4


LANGUAGE OF INSTRUCTION

Polish, English


INTERNSHIP

-

MATERIALS

PRIMARY OR REQUIRED BOOKS/READINGS:

  • W. Stallings, Network Security Essentials. Prentice Hall, 2003

  • J. Stokłosa, T. Bliski, T. Pankowski, Bezpieczeństwo danych w systemach informatycznych. PWN, 2001

  • N. Ferguson, B. Schneier, Kryptografia w praktyce., Helion, 2004

  • S. Garfinkel, G. Spafford, Bezpieczeństwo w Unixie i Internecie. Wyd. RM, 1997

  • W. R. Cheswick. Firewalle i bezpieczeństwo w sieci. Helion, 2003

  • Pieprzyk J., Hardjono Th., Seberry J.: Teoria bezpieczeństwa systemów komputerowych. Helion, Gliwice 2005.

  • Lehtinen R., Russell D., Gangemi Sr. G.T.: Podstawy ochrony komputerów. Helion, Gliwice 2007

  • Barrett D.J., Silverman R.E., Byrnes R.G.: Linux. Bezpieczeństwo. Receptury. Helion. Gliwice 2003

  • Barnett R.C.: Apache. Zabezpieczenia aplikacji i serwerów WWW. Helion. Gliwice 2007


SUPPLEMENTAL OR OPTIONAL BOOKS/READINGS:

  • KEVIN MITNICK, WILLIAM L. SIMON, STEVE WOZNIAK: SZTUKA PODSTĘPU ŁAMAŁEM LUDZI NIE HASŁA., 2010/11

  • KARBOWSKI M., PODSTAWY KRYPTOGRAFII : "HELION", COP. 2006.

  • HOOK D., KRYPTOGRAFIA W JAVIE : OD PODSTAW; [TŁ. Z ANG. ZBIGNIEW BANACH]. - GLIWICE : "HELION", 2006.

  • WALLACE WANG , TAJEMNICE INTERNETU, HACKINGU I BEZPIECZEŃSTWA : METODY WYSZUKIWANIA INFORMACJI, WIRUSY, KONIE TROJAŃSKIE I PROGRAMY SZPIEGUJĄCE, WŁAMANIA I PRZEJMOWANIE DANYCH, ZABEZPIECZANIE SIĘ PRZED ATAKAMI Z SIECI [TŁ. Z ANG. RADOSŁAW MERYK]. - GLIWICE : "HELION", COP. 2005.

  • ANDRZEJ KACZMAREK , ABC BEZPIECZEŃSTWA DANYCH OSOBOWYCH PRZETWARZANYCH PRZY UŻYCIU SYSTEMÓW INFORMATYCZNYCH; GIODO - GENERALNY INSPEKTOR OCHRONY DANYCH OSOBOWYCH. - WARSZAWA : WYDAW. SEJMOWE, 2007.

  • JOHN CHIRILLO , HACK WARS. TOM 1. NA TROPIE HAKERÓW. DATA WYDANIA: 2002/05





©absta.pl 2016
wyślij wiadomość

    Strona główna