Information and Network Security

A tantárgy neve magyarul / Name of the subject in Hungarian: Információ - és hálózatbiztonság

Last updated: 2012. augusztus 28.

Budapest University of Technology and Economics
Faculty of Electrical Engineering and Informatics

Electrical Engineering, M.Sc. program
Obligatory elective subject

Course ID Semester Assessment Credit Tantárgyfélév
VITMM280 3 2/1/0/v 4  
3. Course coordinator and department Dr. Fehér Gábor,
4. Instructors

Name: Position: Department:
Dr. Gábor Fehér, PhD assoiciate professor BME-TMIT
Zömbik László research fellow BME-TMIT

5. Required knowledge Computer networks
6. Pre-requisites
Kötelező:
NEM ( TárgyEredmény( "BMEVIHIMA05" , "jegy" , _ ) >= 2
VAGY
TárgyEredmény("BMEVIHIMA05", "FELVETEL", AktualisFelev()) > 0
VAGY
TárgyEredmény( "BMEVIHIMB00" , "jegy" , _ ) >= 2
VAGY
TárgyEredmény("BMEVIHIMB00", "FELVETEL", AktualisFelev()) > 0 )

A fenti forma a Neptun sajátja, ezen technikai okokból nem változtattunk.

A kötelező előtanulmányi rend az adott szak honlapján és képzési programjában található.

Ajánlott:
none
7. Objectives, learning outcomes and obtained knowledge The objective of the courseis to provide theoretical and practical knowledge from today's information and network security topics. The course introduces the theory and practice of those equipments, methods and algorithms that support secure information sharing over computer networks.
8. Synopsis

Introduction

  • Objectives of the information and network security
  • Threats and attacks

Cryptography

  • Symmetric key encryption
    • Block ciphers: DES, 3DES, AES
    • Stream ciphers: RC4
  • Asymmetric key encryption
    • Basics of modulo arithmetics, RSA, DSA, EC
  • Hash functions: MD5, SHA1
  • Keyed hash functions
  • Keymanagement
    • Diffie-Hellman (DH), multi user DH
  • Keymanagement protocols
  • Digital signature

Secure network communication

  • Attacks on network security
  • Secure communication protocols: IPSec (AH, ESP), TLS/SSL
  • Virtual Private Networks
  • Firewalls
  • NAT, Intrusion detection systems, Honeypots
  • Vulnerability analysis

Security of Wireless Networks

  • WiFi protection
  • WEP, WPA and 802.11i protocols
9. Method of instruction 2 lectures and 1 practice per week. Practice in a computer laboratory.
10. Assessment
  • In the class period there is an in-class test (ZH).
  • In the examination period there is a written examination.
  • Condition for the signature is the pass mark of ZH test (40% above). There is a possibility to rewrite the in-class test (ZH). In the rectification period (repeat period) there is another (final) possibility to rewrite the in-class test (ZH).
  • Students should attend to at least 70% of laboratory classes.
11. Recaps There is one possibility to repeat the test in the class period and there is a final one in the official recap period.
12. Consultations Consultation with the lecturers of the subject is possible at pre-arranged time.
13. References, textbooks and resources
  • Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, ISBN: 0-8493-8523-7
  • Bruce Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, John Wiley & Sons, Inc., ISBN: 0471128457
14. Required learning hours and assignment
Lessons 42
Preparation for lessons 
Preparation for test 10
Home work 
Learning of prepared matters 20
Preparation for exam 48
Total 120
15. Syllabus prepared by

Name: Position: Department:
Dr. Gábor Fehér, PhD associate professor BME-TMIT