Cryptography Algorithms and Security of Information Systems (ΠΛ7): Διαφορά μεταξύ των αναθεωρήσεων
Από Wiki Τμήματος Μαθηματικών
Γραμμή 69: | Γραμμή 69: | ||
=== Syllabus === | === Syllabus === | ||
# Basic Concepts and Definitions in the Security of Information Systems. | |||
# Cryptographic issues: Symmetric, non-symmetric encryption, fraction cipher, cryptographic modes and public key cryptography flow, cryptographic summary functions, cryptanalysis. | |||
# Authentication Protocols and Authentication technologies, One-way hash functions, digital certificates, digital signatures, infrastructure (PKI) and public key algorithms (RSA, DSA, Diffie-Hellman, Elliptic curve) and number theory underlies. | |||
# Development and implementation of C/C++ cryptographic algorithms: Symmetric (DES, AES, 3DES, Blowfish) | |||
# Implementation in C / C++ public key security mechanisms (RSA, Diffie-Hellman), and summary (MD5, SHA) | |||
# Secure elections, anonymous protocols- Anonymity, Transaction Protocols, NFC protocols and security mechanisms, RFID Crypto-1 algorithm and key exchange infrastructures | |||
# Malware models and categories, rootkits, viruses, exploits. Database Security: Basic concepts, models and policies for database access control and methodological framework for safe database and application services design, SQL injections, services monitoring | |||
# System security and management at OS level Windows and Linux. Security issues at user level and administrative management techniques. | |||
# Security of Services: Portscan attacks, Denial of Service attacks, MitM attacks, remote exploits, buffer overflows, Network Security: IP spoofing, ARP spoofing, hijacking, sniffing | |||
# Security Strategies, Network Security components and mechanisms. Perimeter Network defense and safe management: Firewalls, NIDS, designing Identification and Encryption Services | |||
# Presentation of SSL and x.509 certificates. Create and verify digital signature: DSA algorithm, key creation, signing, and verification. Presentation of the GPG tool for email. Creating Certificates. | |||
# Perimeter defense - Firewalls: Create a firewall security policy. Secure network management: Use appropriate SNMP communication software for secure network management. Introduction to IPSec, Virtual Networks, OpenVPN Tool. Presentation of NIDS tools. | |||
# Learn script programming language for Windows AutoIT for Administrative and security tasks and secure tasks-methods implementation | |||
=== Teaching and Learning Methods - Evaluation === | === Teaching and Learning Methods - Evaluation === |
Αναθεώρηση της 20:13, 10 Νοεμβρίου 2022
Graduate Courses Outlines - Department of Mathematics
General
School | School of Science |
---|---|
Academic Unit | Department of Mathematics |
Level of Studies | Graduate |
Course Code | ΠΛ7 |
Semester | 2 |
Course Title | Cryptography Algorithms and Security of Information Systems |
Independent Teaching Activities | Lectures (Weekly Teaching Hours: 3, Credits: 7.5) |
Course Type | Specialized general knowledge |
Prerequisite Courses | - |
Language of Instruction and Examinations |
Greek |
Is the Course Offered to Erasmus Students | Yes (in English) |
Course Website (URL) | See eCourse, the Learning Management System maintained by the University of Ioannina. |
Learning Outcomes
Learning outcomes |
Upon completion of this course postgraduate students:
They will be able to develop cryptographic algorithms and implement encryption methods over a networking environment, to develop secure service mechanisms and algorithms using programming languages such as C / C ++ and libraries such as Libgcrypt and Libmcrypt.
They will be able to distinguish the basic vulnerabilities of Web and application service systems, especially SQL-injection attacks and buffer overflows, and develop appropriate defensive mechanisms.
|
---|---|
General Competences |
|
Syllabus
- Basic Concepts and Definitions in the Security of Information Systems.
- Cryptographic issues: Symmetric, non-symmetric encryption, fraction cipher, cryptographic modes and public key cryptography flow, cryptographic summary functions, cryptanalysis.
- Authentication Protocols and Authentication technologies, One-way hash functions, digital certificates, digital signatures, infrastructure (PKI) and public key algorithms (RSA, DSA, Diffie-Hellman, Elliptic curve) and number theory underlies.
- Development and implementation of C/C++ cryptographic algorithms: Symmetric (DES, AES, 3DES, Blowfish)
- Implementation in C / C++ public key security mechanisms (RSA, Diffie-Hellman), and summary (MD5, SHA)
- Secure elections, anonymous protocols- Anonymity, Transaction Protocols, NFC protocols and security mechanisms, RFID Crypto-1 algorithm and key exchange infrastructures
- Malware models and categories, rootkits, viruses, exploits. Database Security: Basic concepts, models and policies for database access control and methodological framework for safe database and application services design, SQL injections, services monitoring
- System security and management at OS level Windows and Linux. Security issues at user level and administrative management techniques.
- Security of Services: Portscan attacks, Denial of Service attacks, MitM attacks, remote exploits, buffer overflows, Network Security: IP spoofing, ARP spoofing, hijacking, sniffing
- Security Strategies, Network Security components and mechanisms. Perimeter Network defense and safe management: Firewalls, NIDS, designing Identification and Encryption Services
- Presentation of SSL and x.509 certificates. Create and verify digital signature: DSA algorithm, key creation, signing, and verification. Presentation of the GPG tool for email. Creating Certificates.
- Perimeter defense - Firewalls: Create a firewall security policy. Secure network management: Use appropriate SNMP communication software for secure network management. Introduction to IPSec, Virtual Networks, OpenVPN Tool. Presentation of NIDS tools.
- Learn script programming language for Windows AutoIT for Administrative and security tasks and secure tasks-methods implementation
Teaching and Learning Methods - Evaluation
Delivery |
ΧΧΧ | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Use of Information and Communications Technology |
ΧΧΧ | ||||||||||
Teaching Methods |
| ||||||||||
Student Performance Evaluation |
ΧΧΧ |