Security and anonymity in the Internet
Course: Software engineering
Structural unit: Faculty of Computer Science and Cybernetics
Title
Security and anonymity in the Internet
Code
ДВС.3.02.02
Module type
Вибіркова дисципліна для ОП
Educational cycle
Second
Year of study when the component is delivered
2022/2023
Semester/trimester when the component is delivered
4 Semester
Number of ECTS credits allocated
3
Learning outcomes
PLO03. Know and apply fundamental concepts and methodologies of information processes modeling.
PLO06. Analyze, estimate and choose methods, modern hardware and software systems, programming tools, technologies, algorithmic and software solutions for effective implementation of specific software-related production tasks.
PLO09. Know and apply modern professional standards, codes and regulations for software engineering.
Form of study
Full-time form
Prerequisites and co-requisites
Missing.
Course content
The purpose of the discipline is to study the means of secure communication, including protection of computer networks from intruders. As a result of studying the discipline the student must: know the methods of encryption and decryption; know the methods of authentication of the interlocutor; know the methods of guaranteeing data integrity; know how fundamental cryptographic principles can be used to create secure network protocols; be able to defend against attacks by networks of organizations; be able to ensure network security with firewalls and intrusion detection systems; be able to protect the transmission of e-mail and TCP-connections; be able to provide comprehensive security at the network level; be able to protect your wireless LAN; substantiate their own view of the problem, communicate with colleagues on testing and test development, compile written reports; organize their independent work to achieve results.
Recommended or required reading and other learning resources/tools
1. Dzheyms Kurouz, Kit Ross. Komp'yuternyye seti: Niskhodyashchiy podkhod. 6-ye izd. – M.: Izdatel'stvo «E», 2016. – 912 s. – ISBN 978-5-699-78090-7.
2. C. Kaufman, R. Perlman, M. Speciner, Network Security, Private Communication in a Public World, Prentice Hall, Englewood Cliffs, NJ, 1995.
3. R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, Apr. 1992.
4. R. Rivest, The MD4 Message-Digest Algorithm, RFC 1320, Apr. 1992.
5. C. Kaufman, R. Perlman, M. Speciner, Network Security, Private Communication in a Public World, Prentice Hall, Englewood Cliffs, NJ, 1995.
6. H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, Feb. 1997.
7. International Telecommunication Union, ITU-T X.509, The Directory: Publickey and attribute certificate frameworks (August 2005).
8. S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, RFC 1422.
Planned learning activities and teaching methods
Lectures, independent work, tests, exam.
Assessment methods and criteria
Semester assessment:
Test (test): PH2.1 - PH2.5, PH 3.1., PH4.1, PH4.2 - 60 points / 36 points.
Final assessment (in the form of an exam):
1. Maximum number of points that can be obtained by a student: 40 points.
2. Learning outcomes to be evaluated: РН1.1, РН1.2, РН1.3, РН1.4.
3. Form of conducting and types of tasks: written work.
4. Types of tasks: 3 written tasks.
Language of instruction
Ukrainian
Lecturers
This discipline is taught by the following teachers
Yevgen
O.
Demkivsky
Department of Intelligent Software Systems
Faculty of Computer Science and Cybernetics
Faculty of Computer Science and Cybernetics
Departments
The following departments are involved in teaching the above discipline
Department of Intelligent Software Systems
Faculty of Computer Science and Cybernetics