Abbreviation: RAČSIG
|
Load: 30(L)
+ 30(E)
+ 0(LE)
+ 0(S)
+ 0(FLE)
+ 0(PEE)
|
Lecturers in charge: |
dr. sc. Pero Škorput |
Lecturers: |
doc. dr. sc. Pero Škorput
(
Exercises
)
|
Course description: Defining attack types. Basic weak-points. Hardware and software support. Communications and data solutions. The perpetrator
population. Computer crime prevention and treatment programs. Phenomenology of computer crimes. Breaking down physical security.
Breach of staff safety. Breaking down operational security. The importance of understanding the perpetrator. Types of perpetrators
and their detection. The importance of drafting a security policy. Security risk and assessment. Complete and incomplete risk
assessment methods. Fundamentals of physical security. Physical security testing. Internet security and computer network security.
Natural disasters. Threats from the environment. Intrusion Threat Check. Development of security measures for staff. Types
of threats. Variety of threats. Internet protocols. Network Communications (Terminal Types, Communication Types). Protection
of network communications (cryptographic methods, digital signature, protection of physical components, firewalls, RPC, NIS,
Kerberos, NFS). Directory structure. File access control. Web browser risks. Operational security planning. Perpetrators and
information. Development of an operational security program. Operational security enforcement and measures. Types of malicious
computer programs and their impact on security. Common ways to take advantage of network weaknesses. Types of malware computer
viruses, worms, trojan horse, hoax, spam. Detecting the attacker. Monitoring the offender. Collecting and documenting evidence.
Defining the term digital proof to prove work. Knowledge of the work. Detection measures. Team formation. Detection. The organization
of digital media and its security. Legal regulation in the Republic of Croatia and the world. Overview of current development
projects for computer security in the Republic of Croatia and the world. Guidelines for the development of security systems.
|
Compulsory literature: |
1. |
Bača, M.: Uvod u računalnu sigurnost, Narodne novine, 2004. |
2. |
Stallings W., Borwn L.: Computer Security, Principles and Practice, Pearson Prentice Hall, 2008. |
3. |
Gollmann D.: Computer Security, 2nd Edition, Wiley, 2005. |
Recommended literature: |
4. |
Anderson, R.: Security engineering. John Wiley & Sons, New York, 2008. |
5. |
Garfinkel, S., Spafford, G.: Practical UNIX and Internet Security, O'Reilly & Associates, Inc., Sebastpol, CA, 1996. |
|