Security and anonymity in the Internet

Course: Software engineering

Structural unit: Faculty of Computer Science and Cybernetics

Title
Security and anonymity in the Internet
Code
ДВС.3.02.02
Module type
Вибіркова дисципліна для ОП
Educational cycle
Second
Year of study when the component is delivered
2023/2024
Semester/trimester when the component is delivered
4 Semester
Number of ECTS credits allocated
3
Learning outcomes
PLO03. Know and apply fundamental concepts and methodologies of information processes modeling. PLO06. Analyze, estimate and choose methods, modern hardware and software systems, programming tools, technologies, algorithmic and software solutions for effective implementation of specific software-related production tasks. PLO09. Know and apply modern professional standards, codes and regulations for software engineering.
Form of study
Full-time form
Prerequisites and co-requisites
Missing.
Course content
The purpose of the discipline is to study the means of secure communication, including protection of computer networks from intruders. As a result of studying the discipline the student must: know the methods of encryption and decryption; know the methods of authentication of the interlocutor; know the methods of guaranteeing data integrity; know how fundamental cryptographic principles can be used to create secure network protocols; be able to defend against attacks by networks of organizations; be able to ensure network security with firewalls and intrusion detection systems; be able to protect the transmission of e-mail and TCP-connections; be able to provide comprehensive security at the network level; be able to protect your wireless LAN; substantiate their own view of the problem, communicate with colleagues on testing and test development, compile written reports; organize their independent work to achieve results.
Recommended or required reading and other learning resources/tools
1. Dzheyms Kurouz, Kit Ross. Komp'yuternyye seti: Niskhodyashchiy podkhod. 6-ye izd. – M.: Izdatel'stvo «E», 2016. – 912 s. – ISBN 978-5-699-78090-7. 2. C. Kaufman, R. Perlman, M. Speciner, Network Security, Private Communication in a Public World, Prentice Hall, Englewood Cliffs, NJ, 1995. 3. R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, Apr. 1992. 4. R. Rivest, The MD4 Message-Digest Algorithm, RFC 1320, Apr. 1992. 5. C. Kaufman, R. Perlman, M. Speciner, Network Security, Private Communication in a Public World, Prentice Hall, Englewood Cliffs, NJ, 1995. 6. H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, Feb. 1997. 7. International Telecommunication Union, ITU-T X.509, The Directory: Publickey and attribute certificate frameworks (August 2005). 8. S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, RFC 1422.
Planned learning activities and teaching methods
Lectures, independent work, tests, exam.
Assessment methods and criteria
Semester assessment: Test (test): PH2.1 - PH2.5, PH 3.1., PH4.1, PH4.2 - 60 points / 36 points. Final assessment (in the form of an exam): 1. Maximum number of points that can be obtained by a student: 40 points. 2. Learning outcomes to be evaluated: РН1.1, РН1.2, РН1.3, РН1.4. 3. Form of conducting and types of tasks: written work. 4. Types of tasks: 3 written tasks.
Language of instruction
Ukrainian

Lecturers

This discipline is taught by the following teachers

Yevgen O. Demkivsky
Department of Intelligent Software Systems
Faculty of Computer Science and Cybernetics

Departments

The following departments are involved in teaching the above discipline

Department of Intelligent Software Systems
Faculty of Computer Science and Cybernetics