460-4054/03 – Computer Viruses and Security of Computer Systems (PVBPS)

Gurantor departmentDepartment of Computer ScienceCredits3
Subject guarantorprof. Ing. Ivan Zelinka, Ph.D.Subject version guarantorprof. Ing. Ivan Zelinka, Ph.D.
Study levelundergraduate or graduateRequirementOptional
Study languageEnglish
Year of introduction2015/2016Year of cancellation2015/2016
Intended for the facultiesFEIIntended for study typesFollow-up Master
Instruction secured by
LoginNameTuitorTeacher giving lectures
DUB080 Ing. Patrik Dubec
PLU042 Ing. Jan Plucar, Ph.D.
S1A10 doc. RNDr. Petr Šaloun, Ph.D.
ZAT108 Ing. Filip Zatloukal
ZEL01 prof. Ing. Ivan Zelinka, Ph.D.
Extent of instruction for forms of study
Form of studyWay of compl.Extent
Full-time Graded credit 1+2
Combined Graded credit 10+0

Subject aims expressed by acquired skills and competences

The goal is to familiarize the students with problems of computer viruses, their definition and classification, distribution method in computer and misuse of intrusion into computer systems. The course is also the definition of the issue phishing, spam, hacking and cracking and penetration with a demonstration of pre-installed operating systems. Graduate Students will: • Learn the modern techniques of computer intrusion and the possibility of their limitations. • Understand the area of malware sample analysis, functionality and structure. • Will be able to apply cyber defense methods against malware samples. Upon successful completion of the course will be able to graduate to apply the measures of computer systems security.

Teaching methods



The course will discuss a broader range of techniques known as malware. They discussed both historically classic techniques and modern techniques and algorithms. There will also be discussed at the introductory level computer viruses, their classification and distribution methods, the best-known hacker techniques, including the phishing, spam, etc. Students should have a comprehensive knowledge of the course of above mentioned areas, including the possibility of countermeasures applications, increasing security of computer systems. Course will include individual assignments (presentations or projects). Their review and presentation will be part of lectures.

Compulsory literature:

Peter H. Gregory, Computer Viruses For Dummies, For Dummies, ISBN: 9780764574184 Peter Szor, The Art of Computer Virus Research and Defense, Addison-Wesley Professional, ISBN: 0321304543 Jon Erickson, Hacking: The Art of Exploitation, 2nd Edition, No Starch Press; 2nd edition, ISBN: 1593271441 Kevin Beaver, Hacking For Dummies, For Dummies; 3 edition, ISBN-10: 9780470550939 Volitelná Kevin Beaver, Hacking For Dummies, For Dummies; 3 edition, ISBN-10: 9780470550939

Recommended literature:

Kevin Beaver, Hacking For Dummies, For Dummies; 3 edition, ISBN-10: 9780470550939

Way of continuous check of knowledge in the course of semester

Kontrola je založena na vypracovávání protokolů předmětu, pomocí kterých student prokazuje nejen pochopení informací z přednášek, ale i schopnost jejich implementace v daném programovém prostředí. K získání zápočtu je nutno odevzdat cvičícímu všechny požadované protokoly a mít alespoň 80% fyzické účasti na laboratořích. Zápočet je podmínkou NUTNOU k připuštění ke zkoušce.


Další požadavky na studenta

It is required the ability to create programs in arbitrary programming language and apply lecture knowledge into algorithms. Additional requirements are not defined.


Subject has no prerequisities.


Subject has no co-requisities.

Subject syllabus:

Lectures: 1. Artificial intelligence and artificial life, Self-replicated structure (the game of life, Fredkin's self-replicated structures, von Neumann and the theory of self-replicated automata). Artificial life and virtual universe (tierra biomorf, SBEAT, SBART, Eden SWIMBOOT). Artificial Life and Complex Systems. 2. Self-replicated structure, finite automata and Turing machines. Virus definitions, common and different features of biological virus. Classification of malicious code (viruses, adware, spyware, worms ,...) and its spreading code. HOAX. Generators viruses. 3. Malicious code and its dependence on the environment (eg OS, file format, processor architecture, compilers, ...) 4. Methods of infection. Infections files (COM, EXE, API, MBR, DBR, infection ...), art (overwriting viruses, connecting viruses, hollow viruses hidden point ...). Infection of memory, using suspension, swap viruses. 5. Basic defensive strategy of viruses. Scanning the memory trace, anti-debugging, armored viruses, retroviruses, defense against heuristic analysis, emulation and reversing disassembled, use undocumented functions. 6. Creation and generation of viruses. Code of the virus encoded by viruses (decryptor, nonlinear decoding W95/fono, W95/Mad2736) oligomorphic viruses, polymorphic viruses, metamorphic viruses. Generators viruses. 7. Basics of computer networks. Network scanning. Security of Web servers. Scanning ports. 8.Google Hacking. Buffer overflow - buffer overflows. Windows Security accounts. 9. Spam and anti-spam. Spam definitions and history. Tools for fighting spam. Anti-spam strategies and tools for Windows and Linux. Bayesian classifier and SpamAssassin. Mail client and filters. 10. Phishing. Phishing subcategories as spam. Right, phishing and spyware. False identity and false redirects identity. Phishing and Malware. Cracking. Protection Program. Anti - debug and anti - disasembler programs. 11. Hacking gathering, scanning and survey scanning programs, network services and research. Operating systems and attack them. Mac OS X, Windows and Linux. 12. Computer networks and attacks on them. Survey networks, autonomous systems, network services. Wireless and network attacks.Firewall. 13. Attacks on the code, runs on the web. Preventing the incident.implementation of security policies and procedures. Investigation procedures and computer investigations. Trace data and network control. 14. Investigation of the OS, Windows, Unix, Web attacks, hacker tools.Computer viruses, antivirus and Artificial Intelligence Exercise in PC classrooms - Basics of penetration testing - Mapping of vulnerability of computer systems - SQL injection - Cross Site Scripting (XSS) - Forgering Cross Site Request and Session Hijacking (CSFR) - Denial of service (DoS) - Remote shell command execution - Password cracking (Brutal force and dictionary attack) - Testing the vulnerability of WEP and WPA / WPA2 - Use Matasploit framework for penetration testing - Computer viruses - the basic structure - Computer viruses - Advanced Techniques

Conditions for subject completion

Full-time form (validity from: 2015/2016 Winter semester, validity until: 2015/2016 Summer semester)
Task nameType of taskMax. number of points
(act. for subtasks)
Min. number of points
Graded credit Graded credit 100  51
Mandatory attendence parzicipation:

Show history

Occurrence in study plans

Academic yearProgrammeField of studySpec.FormStudy language Tut. centreYearWSType of duty
2015/2016 (N2647) Information and Communication Technology (2612T025) Computer Science and Technology P English Ostrava 2 Optional study plan
2015/2016 (N2647) Information and Communication Technology (2612T025) Computer Science and Technology K English Ostrava 2 Optional study plan

Occurrence in special blocks

Block nameAcademic yearForm of studyStudy language YearWSType of blockBlock owner