02230 - Data Security, Autumn 2005.

General Information

Time: Wednesday (all day)
Location: Lectures: B.308, Auditorium 13; Exercises: B.322, Rooms 033 and 127; Practical classes: B.341, E-databar.
Examination: Written reports. Course work counts 30% towards the grade; a larger final project counts 70%.
Prerequisites: 02100 & 02110 & 02130 (or equivalent).
Text book: C. P. Pfleeger & S. L. Pfleeger: "Security in Computing", third edition, Prentice Hall, 2003.
Lecturers:
       Christian Damsgaard Jensen (CDJ), Building 322/013 (course responsible)
       Robin Sharp (RIS), Building 322/005
       Srdjan Capkun (SCA), Building 322/213
       René Rydhof Hansen (RRH), Building 322/120

Objectives

The objective of the course is to provide an introduction to the basic concepts of computer security. The course contents include: security concepts, such as confidentiality, integrity, authenticity, availability etc. Symmetric and asymmetric cryptography and their uses; key distribution and digital signatures; discretionary and mandatory access control policies for confidentiality and integrity. Communication protocols for authentication, confidentiality and message integrity. Network security; system security, intrusion detection and malicious code. Security models and security evaluation. Administration of security. Legal aspects of computer security.

Course Format

The course is given as a combination of lectures, given by the course lecturers and invited speakers from industry, exercises and practical laboratory work.

Lectures

Lectures will primarily be based on the text book by C. P. Pfleeger & S. L. Pfleeger: "Security in Computing", third edition, Prentice Hall, 2003 (Copies are available at Polyteknisk Boghandel,) but other material may be included, which will then be made available on the web.

Laboratory Work

The laboratory work consists of a number of small assignments, most of them mandatory, which will take place in the databars. These assignments are designed to provide hands-on experience with different security technologies and will typically involve a limited programming exercise, which will be documented through a small report (4-8 pages).

Activity Calendars

Lectures

Relevant Litterature

http://www.imm.dtu.dk/~robin/02230/seclinks.html.