Professional study programme

Back   Schedule   Hrvatski

Information Security SR604-17

ECTS 5 | P 30 | A 15 | L 15 | K 0 | ISVU 175214 | Academic year: 2020./2021.

Course groups

Prikaži sve grupe na predmetu

Course lecturers

Asistent ZAKOM, Associate


Familiarise students with security issues in modern information and communication systems and networks (i.e. understanding of the existing threats, attacks and risks); Teach students how to understand basic principles of modern cryptographic systems and the mode of their practical application in different security protocols; Train students to properly plan and implement appropriate security mechanisms in wired and wireless networks.

Conditions for enrollment

Requirements met for enrolling in the third year of the study programme

Course description

Basic security premises and terms. Basic cryptographic terms. Substitution and transposition ciphers. Symmetric cryptosystems and their application. Block cipher operating modes. Asymmetric cryptosystems and their application. Cryptographic hash functions. Digital signature. Key management. Security aspects of the IPv4 and the IPv6 protocol. Transport layer security. Security threats and malware. Types of attack and possible countermeasures. Security in wireless networks. E-mail security. Types and configuration of firewalls. Virtual private networks. Intrusion detection and prevention.

Student requirements

Defined by the Student evaluation criteria of the Faculty of Electrical Engineering, Computer Science and Information Technology Osijek and paragraph 1.9

Monitoring of students

Defined by the Student evaluation criteria of the Faculty of Electrical Engineering, Computer Science and Information Technology Osijek and paragraph 1.9

Obligatory literature

1. 1 A. Dujella, M. Maretić Kriptografija Element, Zagreb, 2007.

2. 2 W. Stallings Cryptography and Network Security – Principles and Practice Paerson, Boston, 2016.

Pretraži literaturu na:

Recommended additional literature

1. 1 W. Stallings Network Security Essentials – Applications and Standards Prentice Hall, New Jersey, 2013.

Course assessment

Conducting university questionnaires on teachers (student-teacher relationship, transparency of assessment criteria, motivation for teaching, teaching clarity, etc.). Conducting Faculty surveys on courses (upon passing the exam, student self-assessment of the adopted learning outcomes and student workload in relation to the number of ECTS credits allocated to activities and courses as a whole).

Overview of course assesment

Learning outcomes
Upon successful completion of the course, students will be able to:

1. understand and describe basic principles of modern cryptographic systems and their application possibilities

2. interpret and describe existing security threats, attacks and risks in modern computer and communication systems

3. categorise and apply different security systems and mechanisms in a computer network

4. interpret and apply modern Internet security protocols

5. evaluate security requirements and implement security mechanisms in different types of wireless networks

Aktivnosti studenta: Vidi tablicu aktivnosti