vissza a tantárgylistához   nyomtatható verzió    

    Information and Network Security

    A tantárgy neve magyarul / Name of the subject in Hungarian: Információ - és hálózatbiztonság

    Last updated: 2012. augusztus 28.

    Budapest University of Technology and Economics
    Faculty of Electrical Engineering and Informatics

    Electrical Engineering, M.Sc. program
    Obligatory elective subject

    Course ID Semester Assessment Credit Tantárgyfélév
    VITMM280 3 2/1/0/v 4  
    3. Course coordinator and department Dr. Fehér Gábor,
    4. Instructors

    Name: Position: Department:
    Dr. Gábor Fehér, PhD assoiciate professor BME-TMIT
    Zömbik László research fellow BME-TMIT

    5. Required knowledge Computer networks
    6. Pre-requisites
    Kötelező:
    NEM ( TárgyEredmény( "BMEVIHIMA05" , "jegy" , _ ) >= 2
    VAGY
    TárgyEredmény("BMEVIHIMA05", "FELVETEL", AktualisFelev()) > 0
    VAGY
    TárgyEredmény( "BMEVIHIMB00" , "jegy" , _ ) >= 2
    VAGY
    TárgyEredmény("BMEVIHIMB00", "FELVETEL", AktualisFelev()) > 0 )

    A fenti forma a Neptun sajátja, ezen technikai okokból nem változtattunk.

    A kötelező előtanulmányi rend az adott szak honlapján és képzési programjában található.

    Ajánlott:
    none
    7. Objectives, learning outcomes and obtained knowledge The objective of the courseis to provide theoretical and practical knowledge from today's information and network security topics. The course introduces the theory and practice of those equipments, methods and algorithms that support secure information sharing over computer networks.
    8. Synopsis

    Introduction

    • Objectives of the information and network security
    • Threats and attacks

    Cryptography

    • Symmetric key encryption
      • Block ciphers: DES, 3DES, AES
      • Stream ciphers: RC4
    • Asymmetric key encryption
      • Basics of modulo arithmetics, RSA, DSA, EC
    • Hash functions: MD5, SHA1
    • Keyed hash functions
    • Keymanagement
      • Diffie-Hellman (DH), multi user DH
    • Keymanagement protocols
    • Digital signature

    Secure network communication

    • Attacks on network security
    • Secure communication protocols: IPSec (AH, ESP), TLS/SSL
    • Virtual Private Networks
    • Firewalls
    • NAT, Intrusion detection systems, Honeypots
    • Vulnerability analysis

    Security of Wireless Networks

    • WiFi protection
    • WEP, WPA and 802.11i protocols
    9. Method of instruction 2 lectures and 1 practice per week. Practice in a computer laboratory.
    10. Assessment
    • In the class period there is an in-class test (ZH).
    • In the examination period there is a written examination.
    • Condition for the signature is the pass mark of ZH test (40% above). There is a possibility to rewrite the in-class test (ZH). In the rectification period (repeat period) there is another (final) possibility to rewrite the in-class test (ZH).
    • Students should attend to at least 70% of laboratory classes.
    11. Recaps There is one possibility to repeat the test in the class period and there is a final one in the official recap period.
    12. Consultations Consultation with the lecturers of the subject is possible at pre-arranged time.
    13. References, textbooks and resources
    • Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, ISBN: 0-8493-8523-7
    • Bruce Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, John Wiley & Sons, Inc., ISBN: 0471128457
    14. Required learning hours and assignment
    Lessons 42
    Preparation for lessons 
    Preparation for test 10
    Home work 
    Learning of prepared matters 20
    Preparation for exam 48
    Total 120
    15. Syllabus prepared by

    Name: Position: Department:
    Dr. Gábor Fehér, PhD associate professor BME-TMIT