Graduate study programme

Back   Schedule   Hrvatski

Computer Systems Security DKb2-03

ECTS 6 | P 30 | A 15 | L 15 | K 0 | ISVU 149809 | Academic year: 2019./2020.

Course groups

Prikaži sve grupe na predmetu

Course lecturers



Familiarise students with security issues in modern computer systems and networks (threats, attacks, risks), and provide knowledge required for planning, parameter design and implementation of modern cryptosystems, security mechanisms and security protocols into computer networks and systems.

Conditions for enrollment

Requirements met for enrolling in the study programme

Course description

Basic terms of cryptography. Substitution and transposition ciphers. Machines for encryption. Examples of symmetric cryptosystems and their application - DES, 3DES, IDEA, RC5, AES. Linear and differential cryptanalysis. Block cipher operating modes. Public key concept. Examples of asymmetric cryptosystems and their application - RSA, Diffie-Hellman, ElGamal, DSA. Cryptographic hash functions. Digital signature. Random number generators. Security policy and risk management. Security threats. Types of malware. Types of attack and possible countermeasures. Denial of service attack. Firewall types and configuration. Virtual private networks. Methods for intrusion detection and prevention. Intrusion detection systems - HIDS, NIDS. E-mail security. SSL and TLS. HTTPS. IPv4 and IPv6 protocol security – Ipsec. Authentication protocols. Secure routing. Security of wireless local area networks. WEP, WPA, WPA2. Security of ad hoc and sensor networks.

Student requirements

Defined by the Student evaluation criteria of the Faculty of Electrical Engineering, Computer Science and Information Technology Osijek and paragraph 1.9

Monitoring of students

Defined by the Student evaluation criteria of the Faculty of Electrical Engineering, Computer Science and Information Technology Osijek and paragraph 1.9

Obligatory literature

1. 1 Dujella, M. Maretić Kriptografija Zagreb: Element, 2007.

2. 2 Stallings, M. Cryptography and Network Security - Principles and Practice (7th edition) Boston: Pearson, 2016.

Pretraži literaturu na:

Recommended additional literature

1. 1 W. Stallings Network Security Essentials – Applications and Standards Prentice Hall, New Jersey, 2013.

2. 2 W. Stallings Computer Security – Principles and Practice Prentice Hall, New Jersey, 2011.

3. 3 A. Dujella, M. Maretić Kriptografija Element, Zagreb, 2007.

Course assessment

Conducting university questionnaires on teachers (student-teacher relationship, transparency of assessment criteria, motivation for teaching, teaching clarity, etc.). Conducting Faculty surveys on courses (upon passing the exam, student self-assessment of the adopted learning outcomes and student workload in relation to the number of ECTS credits allocated to activities and courses as a whole).

Overview of course assesment

Learning outcomes
Upon successful completion of the course, students will be able to:

1. explain, categorise and describe different types of modern symmetric and asymmetric cryptosystems

2. interpret and describe the existing security threats, attacks and risks in modern computer and communication systems

3. explain properties, characteristics and implementation methods for different security systems and mechanisms intended for modern computer networks

4. estimate and evaluate different Internet security protocols and standards within computer systems and networks

5. analyse security requirements and implement security mechanisms in different types of wireless networks

Aktivnosti studenta: Vidi tablicu aktivnosti