PV204 Security Technologies Overview of the subject Petr Švenda & Zdeněk Říha & Vít Bukač & Václav Lorenc & Milan Brož I PV204 - Introductory info 1.

Slides:



Advertisements
Similar presentations
Computer & Network Forensics Introduction Xinwen Fu.
Advertisements

Introduction to CS170. CS170 has multiple sections Each section has its own class websites URLs for different sections: Section 000:
CAS CS 591 i1 (CS ) Network Security Administrativia.
All About the Master’s Thesis Michael I. Schwartzbach University of Aarhus Department of Computer Science.
1 BUS 3500 MANAGEMENT INFORMATION SYSTEMS Abdou Illia, Ph.D. (Monday 5/17/2010)
MIS 4600 Ethical Hacking & Network Defense January 12, 2010 Abdou Illia, Ph.D
CSS-304: Computer Systems Interface Duisebekov Zhasdauren Faculty of Engineering Suleyman Demirel University.
Operating Systems CS 502. Topics F Background F Admin Stuff F Motivation F Objectives F Operating Systems!
All About the Master’s Thesis Michael I. Schwartzbach Gudmund S. Frandsen University of Aarhus Department of Computer Science.
Computer Science – Information Literacy Seminar ODUCS Information Literacy.
New experiences with teaching Java as a second programming language Ioan Jurca “Politehnica” University of Timisoara/Romania
CS 450 MODELING AND SIMULATION Instructor: Dr. Xenia Mountrouidou (Dr. X)
Course Overview Sarah Diesburg  Bobby Roy COP 5641 / CIS 4930.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
EECE 310 Software Engineering Lecture 0: Course Orientation.
Object Oriented Programming (OOP) Design Lecture 1 : Course Overview Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang.
Object Oriented Programming (OOP) Design Lecture 1 : Course Overview Bong-Soo Sohn Associate Professor School of Computer Science and Engineering Chung-Ang.
Applied Security Breno de Medeiros Florida State University Fall 2005.
CS 006 Effective Use of WWW Fall 2007 WeeSan Lee
Course Overview Ted Baker  Andy Wang COP 5641 / CIS 4930.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
1 [CMP001 Computer Orientation I] Course Guide Ms. Wesal Abdalfattah office#: 357 Ext#: 8612 Prince Sultan University,
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Fall CIS 764 Database Systems Engineering L1: Introduction to … CIS 764 Enterprise Database Systems Engineering: Software.
1 of 8Prof. Dr. Dr. h.c. Otto Spaniol Computer Science, Informatik 4 Communication and Distributed Systems 25/10/2015 Distributed Applications and Network.
Course Information Andy Wang Operating Systems COP 4610 / CGS 5765.
Course Overview Ted Baker  Andy Wang COP 5641 / CIS 4930.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
CMSC 491/691 A Web of Data Administrivia Spring
1 ISEC0511 Programming for Information System Security Lecture Notes #1 Introduction.
Course Overview Mark Stanovich COP 5641 / CIS 4930.
1 BUS 3500 MANAGEMENT INFORMATION SYSTEMS Abdou Illia, Ph.D. (Monday 8/24/2015)
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
S3.kth.se EQ2430/2440 Lecture 21/3-11 Per Zetterberg.
CMSC 491/691 A Web of Data Administrivia Spring
CEN 137 Computer Literature and Skills INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION TECHNOLOGIES Dr. A. Turan Özcerit
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
COP4020 INTRODUCTION FALL COURSE DESCRIPTION Programming Languages introduces the fundamentals of the design and implementation of programming languages.
UNX122 UNX122_022_w1_p1 Operating Systems - Unix Instructor: DAVID WARD.
COP4610 Principles of Operating Systems Prof. Robert van Engelen Department of Computer Science Florida State University.
Course Information CSE 2031 Fall Instructor U. T. Nguyen /new-yen/ Office: CSEB Office hours:  Tuesday,
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
MIS 610: Seminar in Information Systems Management Yong Choi School of Business Administration CSU, Bakersfield.
Course Information CSE 2031 Fall Instructor U.T. Nguyen Office: CSE Home page:
“Babeş-Bolyai” University Faculty of Economics and Business Administration Second semester 1st year, English line of study Business IT Introductive course.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Applied Security Breno de Medeiros Florida State University Spring 2007.
Fundamentals & Ethics of Information Systems IS 201
Data Structures Course Overview SoftUni Team Data Structures
Welcome to SSE3044 Operating Systems!
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
PV204 Security Technologies
Introduction and Overview
Artificial Intelligence (CS 461D)
EECE 310 Software Engineering
The Role of Independent Studies Rationale #7
Andy Wang Operating Systems COP 4610 / CGS 5765
INFS 522 – Computer Systems Concepts
CMPE 152: Compiler Design January 24 Class Meeting
CSC227: Operating Systems
CSS-304: Computer Systems Interface
Communication Systems – 2 Digital Communications
The Role of Independent Studies Rationale #7
Lecture 1 Class Overview
CS201 – Course Expectations
Course overview Lecture : Juan Carlos Niebles and Ranjay Krishna
Presentation transcript:

PV204 Security Technologies Overview of the subject Petr Švenda & Zdeněk Říha & Vít Bukač & Václav Lorenc & Milan Brož I PV204 - Introductory info 1

Requirements Basic knowledge of computer networks Basic knowledge in applied cryptography and IT security User-level experience with Windows and Linux OS, ability to configure tools and/or interfaces Practical experience in programming with imperative languages like C/C++ or Java I PV204 - Introductory info 2

Organization Lectures + seminars + assignments + project + exam Assignments –Assigned regularly (nearly) every week –individual work of each student –expected workload: 4+ hours/week/participant –Network lab available to students Project Exam –Written exam, mostly open questions I PV204 - Introductory info 3

Project organization Groups of several (usually three) students Project defense / report Expected workload: 16 hours/project/participant Theme: design and implement simple security application with aid secure hardware (two factor auth) I PV204 - Introductory info 4

Grading Credits –2+2+2 credits, plus 2 for the final exams Points –Homework (30) – min 15 required –Project (30) – min 15 required –Written exam (90) Grading –A ≥ 90% of maximum number of points –B ≥ 80% of maximum number of points –C ≥ 70% of maximum number of points –D ≥ 60% of maximum number of points –E ≥ 50% of maximum number of points –F < 50% of maximum number of points I PV204 - Introductory info 5

Attendance Lectures –Attendance not obligatory, but highly recommended –Not recorded (small lecture room without video facilities) Seminars –Attendance obligatory –Absences must be excused at the department of study affairs –2 absences are ok Assignments and projects –Done during students free time (e.g. at the dormitory) –Access to network lab and CRoCS lab is possible Some assignments indeed require access to the network lab I PV204 - Introductory info 6

Course resources Lectures (PDF) available in IS –IS = Information System of the Masaryk University Assignments (what to do) available in IS –Submissions done also via IS Additional tutorials/papers/materials from time to time will also be provided in IS –To better understand the issues discussed Recommended literatures –To learn more … I PV204 - Introductory info 7

Recommended literature Bill Blunden. The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System. Wiley; 1 edition, ISBN-10: Wolfgang Rankl, Kenneth Cox. Smart Card Applications: Design models for using and programming smart cards. ISBN-10: X Michael Sikorski, Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press; 1 edition, 2012.ISBN-10: I PV204 - Introductory info 8

Plagiarism Homeworks –Must be worked out independently by each student Projects –Must be worked out by a team of 3 students –Every team member must show his/her contribution Plagiarism, cut&paste, etc. is not tolerated –Plagiarism is use of somebody else words/programs or ideas without proper citation –IS helps to recognize plagiarism –If plagiarism is detected student is assigned -5 points –In more serious cases the Disciplinary committee of the faculty will decide I PV204 - Introductory info 9