This course is elementary in systems security, security tools and techniques. Initially, we are going to explore fundamental concepts of Cryptography, Computer Security, Software Security, Internet Security and more.
Some of the topics we will cover in class:
Introduction : historical overview , classic cryptography , modern ones for joints
Cryptographic protocols : authentication / key distribution , examples (passwords, challenge-response, needham -schroeder , kerberos ), principles attack plan /attacks
Internet security : Internet- level ( IPsec) and protocol - level security protocols ( SSL, TLS, SSH)
Application security : e- mail ( PGP , S/MIME), secure electronic payments ( SET , micro -payments)
PKI: digital certificates , authentication service providers
Other applications : banking sector (ATM), telecommunications ( GSM , wireless ) , digital optical legal services (DVD, Pay-TV )
Security of software and operating systems: programming errors , cryptographic libraries , trusted computing base
Practical tools and techniques : Viruses , Worms, Bots, Spyware, Phishing, monitoring tools, etc.
Safety assessment of systems and products
Electronic warfare : information as an anti - competitive weapon , critical infrastructure , government attacks
Cryptographic policy : legislation , privacy , anonymity , data protection , intellectual property ownership a
Legal aspects, privacy, data protection.
Learning Outcomes
Knowledge: Having attended and succeeded in the course, the student is able to elaborate on the important concepts of information and network security. Understanding: Having attended and succeeded in the course, the student has the ability to explain the operation of individual systems such as encryption algorithms, firewalls, etc. Application: Having attended and succeeded in the course, the student is able to use his knowledge to solve security problems. For example you will be able to use building blocks (such as firewalls and Intrusion Detection Systems) to increase the security of a system. Analysis: : Having attended and succeeded in the course, the student will be able to analyze the contribution of individual sub-systems in achieving the security of a network. Synthesis: Having attended and succeeded in the course, the student is able to combine individual systems (such as honeypots and intrusion prevention systems) to implement more secure systems. Evaluation: Having attended and succeeded in the course, the student is able to compare different solutions (such as different cryptography algorithms) and evaluate the state of a system (such as the severity of a cyber-attack)
Student Performance Evaluation
Specific details on grading can be found on the course’ s website
The courses of the Computer Science Department are designated with the letters "CS" followed by three decimal digits. The first digit denotes the year of study during which students are expected to enroll in the course; the second digit denotes the area of computer science to which the course belongs.
First Digit
Advised Year of Enrollment
1,2,3,4
First, Second, Third and Fourth year
5,6
Graduate courses
7,8,9
Specialized topics
Second Digit
Computer Science Area
0
Introductory - General
1
Background (Mathematics, Physics)
2
Hardware Systems
3
Networks and Telecommunication
4,5
Software Systems
6
Information Systems
7
Computer Vision and Robotics
8
Algorithms and Theory of Computation
9
Special Projects
The following pages contain tables (one for each course category) summarizing courses offered by the undergraduate studies program of the Computer Science Department at the University of Crete. Courses with code-names beginning with "MATH" or "PHYS" are taught by the Mathematics Department and Physics Department respectively at the University of Crete.