This course is elementary in systems security, security tools and techniques. Initially, we are going to explore fundamental concepts of Cryptography, Computer Security, Software Security, Internet Security and more.
Some of the topics we will cover in class:
Introduction : historical overview , classic cryptography , modern ones for joints
Cryptographic protocols : authentication / key distribution , examples (passwords, challenge-response, needham -schroeder , kerberos ), principles attack plan /attacks
Internet security : Internet- level ( IPsec) and protocol - level security protocols ( SSL, TLS, SSH)
Application security : e- mail ( PGP , S/MIME), secure electronic payments ( SET , micro -payments)
PKI: digital certificates , authentication service providers
Other applications : banking sector (ATM), telecommunications ( GSM , wireless ) , digital optical legal services (DVD, Pay-TV )
Security of software and operating systems: programming errors , cryptographic libraries , trusted computing base
Practical tools and techniques : Viruses , Worms, Bots, Spyware, Phishing, monitoring tools, etc.
Safety assessment of systems and products
Electronic warfare : information as an anti - competitive weapon , critical infrastructure , government attacks
Cryptographic policy : legislation , privacy , anonymity , data protection , intellectual property ownership a
Legal aspects, privacy, data protection.
Learning Outcomes
Knowledge: Having attended and succeeded in the course, the student is able to elaborate on the important concepts of information and network security. Understanding: Having attended and succeeded in the course, the student has the ability to explain the operation of individual systems such as encryption algorithms, firewalls, etc. Application: Having attended and succeeded in the course, the student is able to use his knowledge to solve security problems. For example you will be able to use building blocks (such as firewalls and Intrusion Detection Systems) to increase the security of a system. Analysis: : Having attended and succeeded in the course, the student will be able to analyze the contribution of individual sub-systems in achieving the security of a network. Synthesis: Having attended and succeeded in the course, the student is able to combine individual systems (such as honeypots and intrusion prevention systems) to implement more secure systems. Evaluation: Having attended and succeeded in the course, the student is able to compare different solutions (such as different cryptography algorithms) and evaluate the state of a system (such as the severity of a cyber-attack)
Student Performance Evaluation
Specific details on grading can be found on the course’ s website
The courses of the Computer Science Department are designated with the letters "CS" followed by three decimal digits. The first digit denotes the year of study during which students are expected to enroll in the course.
First Digit
Advised Year of Enrollment
1,2,3,4
First, Second, Third and Fourth year
5,6
Graduate courses
7,8,9
Specialized topics
Code
Computer Science Area
A1
Computer architecture and microelectronics
A2
Computer systems, parallel and high performance computing
A3
Computer security and distributed systems
A4
Computer networks, mobile computing, and telecommunications
B1
Algorithms and systems analysis
B2
Databases, information and knowledge management
B3
Software engineering and programming languages
B4
Artificial Intelligence and machine learning
C1
Signal processing and analysis
C2
Computer vision and robotics
C3
Computer graphics and human-computer interaction
C4
Βioinformatics, medical informatics, and computational neuroscience
The following pages contain tables (one for each course category) summarizing courses offered by the undergraduate studies program of the Computer Science Department at the University of Crete. Courses with code-names beginning with "MATH" or "PHYS" are taught by the Mathematics Department and Physics Department respectively at the University of Crete.