SylabUZ
Nazwa przedmiotu | Security engineering |
Kod przedmiotu | 11.9-WE-INFD-SecEng-Er |
Wydział | Wydział Nauk Inżynieryjno-Technicznych |
Kierunek | Informatyka |
Profil | ogólnoakademicki |
Rodzaj studiów | Program Erasmus drugiego stopnia |
Semestr rozpoczęcia | semestr letni 2024/2025 |
Semestr | 1 |
Liczba punktów ECTS do zdobycia | 6 |
Typ przedmiotu | obowiązkowy |
Język nauczania | angielski |
Sylabus opracował |
|
Forma zajęć | Liczba godzin w semestrze (stacjonarne) | Liczba godzin w tygodniu (stacjonarne) | Liczba godzin w semestrze (niestacjonarne) | Liczba godzin w tygodniu (niestacjonarne) | Forma zaliczenia |
Wykład | 30 | 2 | - | - | Egzamin |
Laboratorium | 30 | 2 | - | - | Zaliczenie na ocenę |
- familiarizing the student with cryptographic algorithms and protocols
- development of skills in the use of information security procedures
- familiarizing the student and shaping the skills of defining and applying security policy in company
Computer networks
Information Safety. Definitions. Infrastructure. Security models.
Access to the system. System access control. User access management. Range of the user responsibility. Risk estimation and management.
Security of teleinformatic systems and networks. Types of attacks. Firewalls (IDS and IPS). Physical security. Alarm systems. Protection against electro-magnetic eavesdropping - TEMPEST standard.
Security policies. The role and tasks of the security administrator.
Industrial safety.
Cryptography. Symmetric algorithms (DES, 3DES, AES, Twofish, RCx family, Serpent, Mars) and asymmetric (RSA, DH, ElGamal, EC). Chaining types. Cryptographic protocols. Public key cryptography. Hashing functions. Electronic signature and its verification. Certification of devices and users. PKI architecture. Other services using cryptography. Post quantum cryptography.
Basics of digital forensics.
lecture: conventional lecture, discussion
laboratory: laboratory exercises
Opis efektu | Symbole efektów | Metody weryfikacji | Forma zajęć |
Lecture - the condition for passing is to obtain positive grades from the knowledge tests in the written form, carried out at least once per semester
Laboratory - the condition to pass is the realization of at least 80% of the planned exercises
Components of the final grade = lecture: 50% + laboratory: 50%
W. Stallings, Cryptography and Network Security Principles and Practices, Prentice Hall, 2018
J.P. Aumuasson, Serious Cryptography: A Practical Introduction to Modern Encryption, No starch Press, 2017
J. Forshaw, Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation, No starch Press, 2017
J. Sammons, The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics, Syngress, 2012
1. D. Grahan, Ethical Hacking: A Hands-on Introduction to Breaking In, No starch Press, 2021
2. J. van Woudenberg, The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks, No starch Press, 2021
3. S. McClure et al., Hacking Exposed: Network Security Secrets and Solutions, 2012
Zmodyfikowane przez dr hab. inż. Bartłomiej Sulikowski, prof. UZ (ostatnia modyfikacja: 22-04-2024 09:29)