Sök i programutbudet

Använd sökfunktionen för att leta efter kurser och program i Chalmers utbildningsutbud. Den programplan och utbildningsplan som avser dina studier är i allmänhet från det läsår du började dina studier.

​​​​​​​​​​​​​

Kursplan för

Läsår
EDA263 - Computer security  
 
Kursplanen fastställd 2012-02-18 av programansvarig (eller motsvarande)
Ägare: MPCSN
7,5 Poäng
Betygskala: TH - Fem, Fyra, Tre, Underkänt
Utbildningsnivå: Avancerad nivå
Huvudområde: Datateknik, Informationsteknik
Institution: 37 - DATA- OCH INFORMATIONSTEKNIK


Undervisningsspråk: Engelska
Sökbar för utbytesstudenter
Blockschema: C

Modul   Poängfördelning   Tentamensdatum
Lp1 Lp2 Lp3 Lp4 Sommarkurs Ej Lp
0107 Tentamen 6,0 hp Betygskala: TH   6,0 hp   12 Mar 2013 em V,  28 Aug 2013 em M
0207 Laboration 1,5 hp Betygskala: UG   1,5 hp    

I program

MPCSN COMPUTER SYSTEMS AND NETWORKS, MSC PROGR, Årskurs 1 (obligatoriskt valbar)
TKDAT DATATEKNIK, CIVILINGENJÖR, Årskurs 3 (valbar)
TKITE INFORMATIONSTEKNIK, CIVILINGENJÖR, Årskurs 3 (valbar)
TIDAL DATAINGENJÖR, Årskurs 3 (obligatoriskt valbar)
MPSOF SOFTWARE ENGINEERING, MSC PROGR, Årskurs 2 (valbar)
MPIDE INTERACTION DESIGN AND TECHNOLOGIES, MSC PROGR, Årskurs 2 (valbar)

Examinator:

Docent  Magnus Almgren


Ersätter

EDA261   Tillämpad datasäkerhet EDA262   Datasäkerhet

Kursutvärdering:

http://document.chalmers.se/doc/acfa2b7f-f361-44fd-a7d3-3de203ff05ed


  Gå till kurshemsida

Behörighet:

För kurser inom Chalmers utbildningsprogram gäller samma behörighetskrav som till de(t) program kursen ingår i.

Kursspecifika förkunskaper

The course EDA092 Operating systems or equivalent is recommended,
Some knowledge of Unix and C is an advantage.

Syfte

The course gives basic knowledge in the security area, i.e. how to protect your system against intentional intrusions and attacks. The purpose of intrusions can be made to change or delete resources (data, programs, hardware, etc), to get unauthorized access to confidential information or unauthorized use of the system's services. The course covers threats and vulnerabilities in the computer systems and networks, as well as rules, methods and mechanisms for protection. Modeling and assessment of security and dependability as well as metrication methods are covered. During a few lectures, a holistic security approach is taken and organizational, business-related, social, human, legal and ethical aspects are treated.

Lärandemål (efter fullgjord kurs ska studenten kunna)

After completing the course the student shall have acquired the following knowledge goals. The student shall:

    * have an overall, fundamental understanding of computer security and realize the consequences of insecurity
    * have a general knowledge of protection mechanisms
    * be capable of making a security analysis of different types of systems and suggest ways to improve security
    * be able to deal with a few methods for security modeling
    * understand common methods for security assessment, evaluation and metrication.

Innehåll

Introduction to computer security: definitions, terminology, standards. Some practical examples. Relation to dependability, reliability, availability and safety.
UNIX security: file system, system administration, passwords and accounts, authorization.
Security threats: systematic approach, physical security, including tempest, viruses, worms, Trojan horses, and logic bombs.
Information hiding, steganography and covert channels.
Introduction to cryptography.
Secure operating systems. Security mechanisms: authentication, authorization, access control, file protection, reference monitor, encryption and separation.
Intrusion detection systems. Deception systems.
Security Models: Bell-LaPadula, Biba, Chinese wall etc.
Introduction to Network Security and firewalls.
Security metrics.
Security management and organisation. Security policy and risk analysis. Social engineering, cyber criminality and information warfare.
Laws and ethics.

Organisation

The course consists of a series of lectures, a few exercises and laborative exercises. Normally, one or two lectures are given by lecturers from industry, who give an application perspective on security. The laborative exercises focus on a few common security mechanisms.

This is a basic course in computer security. For those interested in specializations we refer to the courses in Cryptography (TDA351), Network security (EDA491) and Language-based security (TDA601).

Litteratur

See separate literature list.

Examination

Written exam and pass on laboratory exercises.


Sidansvarig Publicerad: on 24 jan 2018.