460-6021/01 – Computer Security (PoB)

Gurantor departmentDepartment of Computer ScienceCredits10
Subject guarantorprof. Ing. Ivan Zelinka, Ph.D.Subject version guarantorprof. Ing. Ivan Zelinka, Ph.D.
Study levelpostgraduateRequirementChoice-compulsory type B
YearSemesterwinter + summer
Study languageCzech
Year of introduction2014/2015Year of cancellation
Intended for the facultiesFEIIntended for study typesDoctoral
Instruction secured by
LoginNameTuitorTeacher giving lectures
ZEL01 prof. Ing. Ivan Zelinka, Ph.D.
Extent of instruction for forms of study
Form of studyWay of compl.Extent
Full-time Examination 28+0
Combined Examination 28+0

Subject aims expressed by acquired skills and competences

The goal is to familiarize the students with problems of computer viruses, their definition and classification, distribution method in computer and misuse of intrusion into computer systems. The course is also the definition of the issue phishing, spam, hacking and cracking and penetration with a demonstration of pre-installed operating systems. Graduate Students will learn the modern techniques of computer intrusion and the possibility of their limitations. Upon successful completion of the course will be able to graduate to apply the measures of computer security systems.

Teaching methods

Individual consultations

Summary

The course will discuss a broader range of techniques known as malware. They discussed both historically classic techniques and modern techniques and algorithms. There will also be discussed at the introductory level computer viruses, their classification and distribution methods, the best-known hacker techniques, including the phishing, spam, etc. Students should have a comprehensive knowledge of the course of above mentioned areas, including the possibility of countermeasures applications, increasing security of computer systems.

Compulsory literature:

Peter H. Gregory, Computer Viruses For Dummies, For Dummies, ISBN: 9780764574184 Peter Szor, The Art of Computer Virus Research and Defense, Addison-Wesley Professional, ISBN: 0321304543 Jon Erickson, Hacking: The Art of Exploitation, 2nd Edition, No Starch Press; 2nd edition, ISBN: 1593271441 Kevin Beaver, Hacking For Dummies, For Dummies; 3 edition, ISBN-10: 9780470550939

Recommended literature:

Kevin Beaver, Hacking For Dummies, For Dummies; 3 edition, ISBN-10: 9780470550939

Way of continuous check of knowledge in the course of semester

Student's knowledge will be verified in the form of problem-solving protocol and its publication.

E-learning

Další požadavky na studenta

Additional requirements are placed on the student.

Prerequisities

Subject has no prerequisities.

Co-requisities

Subject has no co-requisities.

Subject syllabus:

• Basic concepts of cybersecurity • History of computer malware and hacking • Artificial intelligence and artificial life, self-replicating structures (play of life, Fredkin's self-replicating structures, von Neumann and the theory of self-replicating automata). Artificial life and the virtual universe (Tierra, biomorph, SBEAT, SBART, EDEN, SWIMBOOT). Artificial life and complex systems. • Self-replicating structures, finite automata and Turing machines. Virus definition, common and different features with the biological virus. Classification of malicious code (viruses, adware, spyware, worms, ...) and its distribution of code. HOAX. Virus generators. • Malware design and structure. • Malicious code and its dependency on the environment (ie OS, file format, processor, architecture, compilers, ...) • Methods of infection. File infections (com, exe, API, MBR, DBR, ...), infection techniques (rewriting viruses, joining viruses, cavity viruses, secret point ...). Memory infections interrupt usage, swap viruses. • Basic virus defence strategies. Scanning in memory, tracing, protection against debugging, armoured viruses, retroviruses, defence against heuristic analysis, emulation and disassembling, use of undocumented functions. • Creating and generating viruses. Virus code, encoded viruses (decryptors, non-linear decoding, W95 / phono, W95 / Mad2736), oligomorphic viruses, polymorphic viruses, metamorphic viruses. Virus generators. • Artificial intelligence and malware • Reverse engineering, static and dynamic malware identification, Stuxnet

Conditions for subject completion

Full-time form (validity from: 2014/2015 Winter semester)
Task nameType of taskMax. number of points
(act. for subtasks)
Min. number of points
Examination Examination  
Mandatory attendence parzicipation:

Show history

Occurrence in study plans

Academic yearProgrammeField of studySpec.FormStudy language Tut. centreYearWSType of duty
2019/2020 (P0613D140005) Computer Science P Czech Ostrava Choice-compulsory type B study plan
2019/2020 (P0613D140005) Computer Science K Czech Ostrava Choice-compulsory type B study plan
2019/2020 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics P Czech Ostrava Choice-compulsory study plan
2019/2020 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics K Czech Ostrava Choice-compulsory study plan
2018/2019 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics P Czech Ostrava Choice-compulsory study plan
2018/2019 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics K Czech Ostrava Choice-compulsory study plan
2017/2018 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics P Czech Ostrava Choice-compulsory study plan
2017/2018 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics K Czech Ostrava Choice-compulsory study plan
2016/2017 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics P Czech Ostrava Choice-compulsory study plan
2016/2017 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics K Czech Ostrava Choice-compulsory study plan
2015/2016 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics P Czech Ostrava Choice-compulsory study plan
2015/2016 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics K Czech Ostrava Choice-compulsory study plan
2014/2015 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics P Czech Ostrava Choice-compulsory study plan
2014/2015 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics K Czech Ostrava Choice-compulsory study plan
2014/2015 (P1807) Computer Science, Communication Technology and Applied Mathematics (1801V001) Informatics K English Ostrava Choice-compulsory study plan

Occurrence in special blocks

Block nameAcademic yearForm of studyStudy language YearWSType of blockBlock owner