Search programme

​Use the search function to search amongst programmes at Chalmers. The study programme and the study programme syllabus relating to your studies are generally from the academic year you began your studies.

Syllabus for

Academic year
EDA262 - Computer security
 
Owner: TDATA
4,0 Credits (ECTS 6)
Grading: TH - Five, Four, Three, Not passed
Level: C
Department: 37 - COMPUTER SCIENCE AND ENGINEERING


Teaching language: English

Course module   Credit distribution   Examination dates
Sp1 Sp2 Sp3 Sp4 No Sp
0104 Examination 3,0 c Grading: TH   3,0 c   22 Oct 2005 pm V,  11 Jan 2006 pm V,  29 Aug 2006 pm V
0204 Laboratory 1,0 c Grading: UG   1,0 c    

In programs

TELTA ELECTRICAL ENGINEERING, Year 4 (elective)
TTFYA ENGINEERING PHYSICS, Year 4 (elective)
TITEA SOFTWARE ENGINEERING, Year 4 (elective)
TITEA SOFTWARE ENGINEERING, Year 2 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING - Computer security, Year 4 (compulsory)
TDATA COMPUTER SCIENCE AND ENGINEERING - Engineering of Computer-Based Systems, Year 4 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING - Communications System, Year 4 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING, Year 3 (elective)
DCMAS MSc PROGR IN DEPENDABLE COMPUTER SYSTEMS, Year 1 (compulsory)

Examiner:

Bitr professor  Erland Jonsson


Replaces

EDA261   Applied computer security


Eligibility:

For single subject courses within Chalmers programmes the same eligibility requirements apply, as to the programme(s) that the course is part of.

Course specific prerequisites

Knowledge corresponding to the course Operating systems offered by the D-program is presupposed.

Aim

The course gives basic and applied knowledge in the security area, i.e. how to protect your system against intentional intrusions and attacks. The purpose of intrusions can be made to change or delete resources (data, programs, hardware, etc), to get unauthorized access to confidential information or unauthorized use of the system's services. The course covers threats and vulnerabilities in the computer systems and networks, as well as rules, methods and mechanisms for protection. The course treats security in the context of dependability. During a few lectures, a holistic security approach is taken and organizational, business-related, social, human, legal and ethical aspects are treated.

Goal

After completing the course the student shall have an overall, fundamental understanding of computer security and realize the consequences of insecurity for the studied systems. The student shall also be capable of making a security analysis of different types of systems and suggest ways to improve security.

Content

Introduction to computer security: definitions, terminology, standards. Some practical examples. Relation to reliability, availability and safety.


UNIX security: file system, system administration, passwords and accounts, authorization.

Security threats: systematic approach, physical security, including tempest, viruses, worms, Trojan horses, and logic bombs.

Information hiding, steganography and covert channels.

Introduction to cryptography.

Secure operating systems. Security mechanisms: authentication, authorization, access control, file protection, reference monitor, encryption and separation.

Intrusion detection systems. Deception systems.

Security Models: Bell-LaPadula, Biba etc.

Introduction to Network Security and firewalls.

Security metrics.

Security management and organisation. Security policy and risk analysis. Social engineering and cyber criminality.

Laws and ethics.

Organisation

The course consists of a series of lectures, a few exercises and laborative exercises. Normally, one or two lectures are given by lecturers from industry, who give an application pespective on security. The laborative exercises focus on a few common security mechanisms.

This is a basic course in Computer Security. For those interested in specializations we refer to the courses in Cryptography (TDA350), Network Security (EDA490) and Language-Based Security (TDA600).

Literature

Pfleeger&Pfleeger: Security in Computing. third edition. Prentice-Hall 2003. ISBN 0-13-035548-8 (hard cover). Offprints.

Examination

Written exam and pass on laboratory exercises


Page manager Published: Mon 28 Nov 2016.