Search programme

​Use the search function to search amongst programmes at Chalmers. The study programme and the study programme syllabus relating to your studies are generally from the academic year you began your studies.

Syllabus for

Academic year
EDA261 - Applied computer security
 
Owner: TDATA
4,0 Credits (ECTS 6)
Grading: TH - Five, Four, Three, Not passed
Level: A
Department: 0735 - Computer engineering


Teaching language: English

Course module   Credit distribution   Examination dates
Sp1 Sp2 Sp3 Sp4 No Sp
0196 Examination 2,5 c Grading: TH   2,5 c   13 Dec 2003 am M,  13 Apr 2004 am M,  24 Aug 2004 pm V
0296 Laboratory 1,5 c Grading: UG   1,5 c    

In programs

TAUTA AUTOMATION AND MECHATRONICS ENGENEERING, Year 4 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING, Year 3 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING - Engineering of Computer-Based Systems, Year 4 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING - Communications System, Year 4 (elective)
TELTA ELECTRICAL ENGINEERING, Year 4 (elective)
TITEA INFORMATION ENGINEERING, Year 3 (elective)
TITEA INFORMATION ENGINEERING, Year 2 
TTFYA ENGINEERING PHYSICS, Year 4 (elective)
DCMAS MSc PROGR IN DEPENDABLE COMPUTER SYSTEMS, Year 1 (compulsory)

Examiner:




  Go to Course Homepage

Eligibility:

For single subject courses within Chalmers programmes the same eligibility requirements apply, as to the programme(s) that the course is part of.

Course specific prerequisites

Basic knowledge in operating systems as well as at least one programming language is desirable.

Aim

The course gives a broad overview of the area of computer and IT security
- Background: motivation for computer security and definition of fundamental
concepts; The holistic perspective; Relation to the dependability area

- Threats, vulnerabilities, attacks; Malicious software, viruses, worms and trojan
horses, etc; taxonomies

- Security methods and mechanisms; authentication, access control, separation
Intrusion detection systems, attacker behaviour

- Brief overview of cryptography; steganography

- Secure operating systems; Reference monitor concept; Security Models

- Communication security; firewalls; protocols; virtual private networks

- Security assessment and metrication; standards

- Organisational and legal aspects; key escrow; privacy

Content

Introduction to computer security: definitions, terminology, standards, and legal aspects. Some practical examples. Connection to reliability.

Security threats: systematic approach, physical security, including compromising radiation, viruses, worms, Trojan horses, and logic bombs.

Secure operating systems. Security mechanisms: authentication, access control, file protection, reference monitor, encryption, separation, and intrusion detection.

Security Models: Bell-LaPadula, Biba etc.

UNIX-specific security: file system, system administration, passwords and accounts, authorization, network connectivity. Detailed examples.

Network Security: secure protocols, traffic control, covert channels.

Prediction and measurement of security. Security management and risk analysis. Laws and ethics.

Organisation

The course consists of a series of lectures and laborative exercises.

The lectures cover three main areas: basic computer security, security threats and protection, and security in distributed computer systems.

The laborative exercises focus on practical study of some common security mechanisms.

Literature

Pfleeger: Security in Computing, 2nd edition, Prentice-Hall 1997. ISBN 0-13-185794-0 (Will probably be replaced for year 2003/04 ith the 3rd edition).

Examination

Written exam and pass on laboratory exercises


Page manager Published: Mon 28 Nov 2016.