Computer Security
Abbreviation: RAČSIG Load: 30(L) + 30(E) + 0(LE) + 0(S) + 0(FLE) + 0(PEE)
Lecturers in charge: dr. sc. Pero Škorput
Lecturers: doc. dr. sc. Pero Škorput ( Exercises )
Course description: Defining attack types. Basic weak-points. Hardware and software support. Communications and data solutions. The perpetrator population. Computer crime prevention and treatment programs. Phenomenology of computer crimes. Breaking down physical security. Breach of staff safety. Breaking down operational security. The importance of understanding the perpetrator. Types of perpetrators and their detection. The importance of drafting a security policy. Security risk and assessment. Complete and incomplete risk assessment methods. Fundamentals of physical security. Physical security testing. Internet security and computer network security. Natural disasters. Threats from the environment. Intrusion Threat Check. Development of security measures for staff. Types of threats. Variety of threats. Internet protocols. Network Communications (Terminal Types, Communication Types). Protection of network communications (cryptographic methods, digital signature, protection of physical components, firewalls, RPC, NIS, Kerberos, NFS). Directory structure. File access control. Web browser risks. Operational security planning. Perpetrators and information. Development of an operational security program. Operational security enforcement and measures. Types of malicious computer programs and their impact on security. Common ways to take advantage of network weaknesses. Types of malware computer viruses, worms, trojan horse, hoax, spam. Detecting the attacker. Monitoring the offender. Collecting and documenting evidence. Defining the term digital proof to prove work. Knowledge of the work. Detection measures. Team formation. Detection. The organization of digital media and its security. Legal regulation in the Republic of Croatia and the world. Overview of current development projects for computer security in the Republic of Croatia and the world. Guidelines for the development of security systems.
Lecture languages: hr
Compulsory literature:
1. Bača, M.: Uvod u računalnu sigurnost, Narodne novine, 2004.
2. Stallings W., Borwn L.: Computer Security, Principles and Practice, Pearson Prentice Hall, 2008.
3. Gollmann D.: Computer Security, 2nd Edition, Wiley, 2005.
Recommended literature:
4. Anderson, R.: Security engineering. John Wiley & Sons, New York, 2008.
5. Garfinkel, S., Spafford, G.: Practical UNIX and Internet Security, O'Reilly & Associates, Inc., Sebastpol, CA, 1996.
Legend
L - Lectures
E - Exercises
LE - Laboratory exercises
S - Seminar
FLE - Practical foreign language exercises
PEE - Physical education excercises
* - Not graded