Budapest University of Technology and Economics, Faculty of Electrical Engineering and Informatics

    Belépés
    címtáras azonosítással

    vissza a tantárgylistához   nyomtatható verzió    

    IT Security

    A tantárgy neve magyarul / Name of the subject in Hungarian: IT biztonság

    Last updated: 2022. augusztus 31.

    Budapest University of Technology and Economics
    Faculty of Electrical Engineering and Informatics
    BSc
    Course ID Semester Assessment Credit Tantárgyfélév
    VIHIAC07 6 3/0/1/v 5  
    3. Course coordinator and department Dr. Buttyán Levente,
    4. Instructors Dr. Levente Buttyán, Associate Professor, HIT
    Dr. Gergely Ács, Associate Professor, HIT
    Dr. Boldizsár Bencsáth, Assistant Professor, HIT
    Dr. Gergely Biczók, Associate Professor, HIT
    Dr. Tamás Holczer, Assistant Professor, HIT
    Dorottya Futóné Papp, Assistant Professor, HIT
    András Gábor Gazdag, Assistant Professor, HIT
    Gergő Ládi, Research Assistant, HIT
    5. Required knowledge Computer programming
    Java and C/C++ programming languages
    Operating systems
    Communication Networks
    6. Pre-requisites
    Ajánlott:
    Communication Networks
    7. Objectives, learning outcomes and obtained knowledge This course gives an overview of the different areas of IT security with the main goal of increasing the security awareness of computer engineering students and shaping their attitude towards designing and operating secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional carrier, and at the same time, it provides a basis for those student who want to comtinue their studies at MSc level. Some topics (e.g., software security, web security, cryptography) is also covered in laboratory exercises, hence wrt. those topics, the aim is that the students will not only understand the concepts, but they can also acquire practical experience and skills.
    8. Synopsis

    Basic concepts of IT secuity and security risk management: common security objectives (CIA and AAA); overview of attacker profiles, vulnerabilities, security mechanisms; risk assessment, security engineering, security operations; ethical issues in IT security. (2x45 min)
    Cryptography: introduction of basic notions in cryptography via examples from history, main milestones in the history of cryptography. Modern cryptographic algorithms: symmetric and asymmetric key ciphers, hash functions, message authentication codes, digital signature schemes, random number generation, key exchange protocols, PKI. Overview of modern cryptographic applications, common issues with cryptography in practical systems. (6x45 min)
    Authentication: concept, methods, applications; authentication based on knowledge, possession, and biometry, advantages and disadvantages; possible attacks and countermeasures; multi-factor authentication; case studies. Standards, frameworks, protocols related to authentication (e.g., OpenID, Kerberos, FIDO). (2x45min)
    Authorization: concept, methods, applications; case studies and application examples.  Standards, frameworks, protocols related to authorization (e.g., OAuth, SAML). (2x45min)
    Access control: general model and the DAC and MAC approach. Authorization and access control in Linux-based operating systems: users, groups, access rights; POSIX ACLs, SELinux, AppArmor. Authorization and access control in Windows: users, groups, access rights for the file system and for sharing (2x45 min).
    Software security: security issues at the design, implementation, testing, and operation phases of software, and possible approaches to solve these issues. Threat modelling in the design phase, secure coding principles. Security analysis and testing of software (code review, risk assessment, software penetration testing, fuzzing), and related tools. Implementation issues in low level programming languages: causes and exploitation of memory corruption vulnerabilities; examples (e.g., buffer overflow, heap overflow, format string, ROP, etc.); countermeasures against memory corruption. Implementation issues in web-based applications: attacks on the client side (e.g., XSS, CSRF) and on the server side (e.g., SQL injection); possible countermeasures (e.g., SOP, CSP, etc.) (8x45 min)
    Network security: phases of typical network based attacks (reconnaissance, intrusion, backdoor installation, lateral movement, priviledge escalation), methods and tools used in these phases. Penetration testing (ethical hacking) of networks and network-based systems. Network security mechanisms: perimeter defense with firewalls, types, operation, and configuration of firewalls; network intrusion detection systems (IDS); SIEM systems; virtual private networks (VPNs). (6x45 min)
    Malware: concept and operation of malware, types of malware, malware infection, spreading, and evasion techniques. Malware related case studies (cybercrime, botnets, targeted attacks (APT)). Techniques of detecting malware. (2x45 min)
    Secure operations of systems: Vulnerability management, patching, updating, back-up. Handling security incidents: detecting and recovering from malware infections, log analysis, basics of memory and disk forensics. (2x45 min)
    Privacy: concepts of privacy and data protection, motivating examples; tracking techniques ont he web (e.g., browser fingerprinting, third party cookies); anonymous communication systems and their applications; concept and techniques of query auditing; anonymization of data; psychological  profiling. (2x45 min)
    Security of machine learning: Motivating examples for security issues in machine learning (confidentiality, integrity, availability problems); auditing machine learning models; legal background. Confidentiality: model inversion, membership attacks. Integrity: adversarial samples (evasion), poisoning training data (targeted pollution). Availability: sponge samples, untargeted pollution. (4x45 min)
    Economics of security and privacy: individual and organizational incentives in information security. Asymmetric information: contraselection, moral hazard, lemon markets. Example for the lack of coordantion of incentives: market of IT security solutions and services. Externalities, security interdependence. Economics of vulnerabilities. Cyber insurance. Economics of privacy, interdependent privacy (e.g., Facebook, Google, location privacy, etc.) (4x45 min)
    If a lecture is cancelled due to holidays, then the topic of Economics of Security and Privacy will be shortened and presented in a single lecture.


    1.    Using a cryptographic library: creating simple programs that use cryptographic mechanisms (encryption, digital signature) implemented in a cryptographic library.
    2.    Input validation: techniques for validating inputs of a program in order to detect and filter potentially harmful inputs.
    3.    Software security testing: security testing methods applicable to software developed in various frameworks, with a focus on software developed in low level languages.
    4.    Security of web-based systems: trying attack techniques used against web-based applications and identifying and applying appropriate countermeasures.
    5.    Incident response and digital forensics: Analyzing logs and recorded network traffic (packet capture); trying tools for memory and disk forensics.
    6.    Privacy: development of a query auditor using an appropriate linear algebra library.

    9. Method of instruction Lectures and laboratory exercises:
    •    Conceptual knowledge is delivered in the form of lectures (with illustrative examples and case studies). There are also reading assignments to some of the topics, which require individual work from the students.
    •    Practical skills are acquired via laboratory exercises (remote or local) where students solve challenges individually with potential support from lab instructors. The students have to prepare for these exercises by individually studying lab manuals distributed before the exercise sessions.
    10. Assessment •    1 written midterm test (requirement for passing: achieving min. 40% of the total points)
    •    Successfully executing 4 out of 6 (or 3 out of 5) laboratory exercises (requirement for successful execution of a lab exercise: achieving min. 50% of the total points)
    •    Written exam test (requirement for passing: achieving min. 40% of the total points)

    Computation of the final grade:
    1/3 * MT + 2/3 * ET (rounded to the nearest integer), where MT is the result of the successful midterm test and ET is the result of the successful exam test.
    11. Recaps Failed or missed laboratory exercises cannot be re-taken.
    A failed or missed midterm test can be re-taken once.
    12. Consultations At ad hoc times agreed with the instructiors.
    13. References, textbooks and resources •    Online material associated with the course  (book chapters, conference papers, blog posts)
    •    Chapters of The Cyber Security Body Of Knowledge (CyBOK) (available at https://www.cybok.org/)
    14. Required learning hours and assignment
    Kontakt óra56
    Félévközi készülés órákra20
    Felkészülés zárthelyire20
    Házi feladat elkészítése0
    Kijelölt írásos tananyag elsajátítása14
    Vizsgafelkészülés40
    Összesen150
    15. Syllabus prepared by Dr. Levente Buttyán, Associate Professor, HIT
    Dr. Gergely Ács, Associate Professor, HIT
    Dr. Boldizsár Bencsáth, Assistant Professor, HIT
    Dr. Gergely Biczók, Associate Professor, HIT
    Dr. Tamás Holczer, Assistant Professor, HIT
    Dorottya Futóné Papp, Assistant Professor, HIT
    András Gábor Gazdag, Assistant Professor, HIT
    Gergő Ládi, Research Assistant, HIT