460-4122/03 – Computer Attacks and Defence (POU)

Gurantor departmentDepartment of Computer ScienceCredits6
Subject guarantorprof. Ing. Ivan Zelinka, Ph.D.Subject version guarantorprof. Ing. Ivan Zelinka, Ph.D.
Study levelundergraduate or graduateRequirementChoice-compulsory type A
Year2Semestersummer
Study languageCzech
Year of introduction2018/2019Year of cancellation
Intended for the facultiesFEIIntended for study typesFollow-up Master
Instruction secured by
LoginNameTuitorTeacher giving lectures
PLU042 Ing. Jan Plucar, Ph.D.
SZC0025 Ing. Miloslav Szczypka
Extent of instruction for forms of study
Form of studyWay of compl.Extent
Full-time Credit and Examination 2+2
Part-time Credit and Examination 10+8

Subject aims expressed by acquired skills and competences

The course is divided into several blocks, which are thematically focused on the following areas: theoretical introduction, which will explain the basic concepts and vocabulary of cyber security, the comparison of operating systems and explanation of the way how to exploit mistakes in such systems, a description of the behavior of specific attacks and their modifications (course focuses on 2 specific types of attacks- ransomware and denial of Service), creatinon of a network of Internet robots (botnet) and defence against attacks from these networks, the method for analyzing the behavior and structure of the virus, explaining the process of developing the virus and the antivirus, recommended user behavior when using the internet, which will be supplemented by real world use cases, forensic techniques.

Teaching methods

Lectures
Tutorials
Project work

Summary

The course will cover a wider range of defense techniques and attacks on computer systems. There will be mentioned both historically classic techniques and modern processes and algorithms. The course will include targeted (hacking) and spyware attacks, botnets, and so on. Part of the course will also be the basics of digital forensic analysis and penetration testing. After completing the course, the student should have a thorough knowledge of the above-mentioned areas, including the possibility of applying countermeasures and enhancing the security of computer systems. Part of the course will include separate assignments from lectures (or exercises). Their review and presentation will be part of lectures. Course will include individual assignments (presentations or projects). Their review and presentation will be part of lectures.

Compulsory literature:

1. Diogenes Y., Ozkaya E., Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, Packt Publishing, 2019, ISBN 978-1838827793

Recommended literature:

[1] Velu V. K., Beggs R., Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux, Packt Publishing, 2019, ISBN 978-1789340563 [2] Anson S., Applied Incident Response, Wiley, 2020, ISBN 978-1119560265 [3] Roberts J. S., Brown R., Intelligence-Driven Incident Response: Outwitting the Adversary, O'Reilly Media, 2017, ISBN 978-1491934944

Way of continuous check of knowledge in the course of semester

Students are checked based on course protocols, by which the student demonstrates not only an understanding of information from lectures, but also the ability to implement them in a given programming environment. To obtain the credit, it is necessary to submit to the instructor all required protocols and to have at least 80% physical participation in laboratories. Credit is a NECESSARY condition for admission to the oral exam.

E-learning

Other requirements

It is required the ability to create programs in arbitrary programming language and apply lecture knowledge into algorithms. Additional requirements are not defined.

Prerequisities

Subject has no prerequisities.

Co-requisities

Subject has no co-requisities.

Subject syllabus:

Lectures: 1. Introduction 2. Comparison of operating systems and well-known vulnerabilities 3. Types of cyber attacks 4. Evolution of ransomware and defense against ransomware attacks (CryptoLocker, CryptoWall, CTB Locker, etc.) 5. Botnets and denial of service attacks (DOS, DDOS) 6. Analysis of virus source code, debugging methods and tools 7. Basic techniques for reducing the chances of virus detection 8. Antivirus and immunization methods 9. Abusing software bugs 10. Software penetration testing 11. User identity, analysis of behavior and social networks analysis 12. Forensic techniques 1: analyze seized equipment 13. Forensic techniques 2: reconstruction of user activities on seized equipment Laboratories: 1. File inclusion: Introducing web attacks and getting familiar with the DVWA application that we will use in the next few exercises. 2. SQL Injection: Students will extract user passwords from database alongside with another useful information such as DB structure, name and version. 3. Password cracking: Cracking passwords using a brute force or dictionary attack algorithms. 4. XSS and Session hijacking: Exercise showing an interesting web attack - stealing a foreign session. Try to steal a session of a user who visits a guestbook page in the DVWA application. 5. Drive-by download: Combination of malicious code delivery and its activation through JavaScript. Windows script host usage and possibilities of remote communication and access to the power shell from JavaScript. 6. Denial of service: Students will perform denial of service attack on the prepared web servers. Wireshark network analysis tool will be used to compare legitimate and malicious traffic. 7. Google hacking: Introduction to information gathering using available tools such as google search engine. 8. Hacking: Practical test of simple hacking. Learn basic hacking techniques using the www.hackthissite.org project. 9. Exploitation, Metasploit framework: Vulnerability exploitation using Metasploit framework. Use the Metasploit framework to prepare the attack environment to allow the attacker to exploit through vulnerability in Adobe Flash Player. 10. Penetration testing: A final exercise where students recapitulate the acquired knowledge. A fictitious company asked you to perform a security audit or penetration testing. On a theoretical level, simulate and write down the procedures and tools used. 11. Student presentations Course will include individual assignments (presentations or projects). Their review and presentation will be part of lectures.

Conditions for subject completion

Full-time form (validity from: 2018/2019 Winter semester)
Task nameType of taskMax. number of points
(act. for subtasks)
Min. number of pointsMax. počet pokusů
Credit and Examination Credit and Examination 100 (100) 51
        Credit Credit 45  21
        Examination Examination 55  30 3
Mandatory attendence participation: To pass thorough laboratory exercises: 80% presence in laboratories, submission of all protocols and passing the exam according to the lecturer conditions.

Show history

Conditions for subject completion and attendance at the exercises within ISP: Completion of all mandatory tasks within individually agreed deadlines.

Show history

Occurrence in study plans

Academic yearProgrammeBranch/spec.Spec.ZaměřeníFormStudy language Tut. centreYearWSType of duty
2024/2025 (N0612A140004) Information and Communication Security IKB P Czech Ostrava 1 Compulsory study plan
2024/2025 (N0613A140034) Computer Science DS P Czech Ostrava 1 Choice-compulsory type B study plan
2024/2025 (N0613A140034) Computer Science PSS P Czech Ostrava 2 Choice-compulsory type A study plan
2024/2025 (N0613A140034) Computer Science PSS K Czech Ostrava 2 Choice-compulsory type A study plan
2024/2025 (N0613A140034) Computer Science DS K Czech Ostrava 1 Choice-compulsory type B study plan
2024/2025 (N0714A060020) Communication and Information Technology P Czech Ostrava 1 Optional study plan
2024/2025 (N0714A060020) Communication and Information Technology K Czech Ostrava 1 Optional study plan
2024/2025 (N2647) Information and Communication Technology (2612T025) Computer Science and Technology P Czech Ostrava 1 Optional study plan
2023/2024 (N0612A140004) Information and Communication Security IKB P Czech Ostrava 1 Compulsory study plan
2023/2024 (N0613A140034) Computer Science PSS K Czech Ostrava 2 Choice-compulsory type A study plan
2023/2024 (N0613A140034) Computer Science DS K Czech Ostrava 1 Choice-compulsory type B study plan
2023/2024 (N0613A140034) Computer Science DS P Czech Ostrava 1 Choice-compulsory type B study plan
2023/2024 (N0613A140034) Computer Science PSS P Czech Ostrava 2 Choice-compulsory type A study plan
2023/2024 (N0714A060020) Communication and Information Technology P Czech Ostrava 1 Optional study plan
2023/2024 (N0714A060020) Communication and Information Technology K Czech Ostrava 1 Optional study plan
2023/2024 (N2647) Information and Communication Technology (2612T025) Computer Science and Technology P Czech Ostrava 1 Optional study plan
2022/2023 (N0613A140034) Computer Science PSS K Czech Ostrava 2 Choice-compulsory type A study plan
2022/2023 (N0613A140034) Computer Science DS K Czech Ostrava 1 Choice-compulsory type B study plan
2022/2023 (N0613A140034) Computer Science DS P Czech Ostrava 1 Choice-compulsory type B study plan
2022/2023 (N0613A140034) Computer Science PSS P Czech Ostrava 2 Choice-compulsory type A study plan
2022/2023 (N0714A060020) Communication and Information Technology P Czech Ostrava 1 Optional study plan
2022/2023 (N0612A140004) Information and Communication Security IKB P Czech Ostrava 1 Compulsory study plan
2022/2023 (N0714A060020) Communication and Information Technology K Czech Ostrava 1 Optional study plan
2022/2023 (N2647) Information and Communication Technology (2612T025) Computer Science and Technology P Czech Ostrava 1 Optional study plan
2021/2022 (N0612A140004) Information and Communication Security IKB P Czech Ostrava 1 Compulsory study plan
2021/2022 (N2647) Information and Communication Technology (2612T025) Computer Science and Technology P Czech Ostrava 1 Optional study plan
2020/2021 (N0612A140004) Information and Communication Security IKB P Czech Ostrava 1 Compulsory study plan
2020/2021 (N2647) Information and Communication Technology (1801T064) Information and Communication Security P Czech Ostrava 1 Compulsory study plan
2020/2021 (N2647) Information and Communication Technology (2612T025) Computer Science and Technology P Czech Ostrava 1 Optional study plan
2019/2020 (N2647) Information and Communication Technology (1801T064) Information and Communication Security P Czech Ostrava 1 Compulsory study plan
2019/2020 (N0612A140004) Information and Communication Security IKB P Czech Ostrava 1 Compulsory study plan
2018/2019 (N2647) Information and Communication Technology (1801T064) Information and Communication Security P Czech Ostrava 1 Compulsory study plan

Occurrence in special blocks

Block nameAcademic yearForm of studyStudy language YearWSType of blockBlock owner

Assessment of instruction



2022/2023 Summer
2021/2022 Summer
2020/2021 Summer
2018/2019 Winter