Internet security

Course Information
TitleΑσφάλεια στο Διαδίκτυο / Internet security
CodeCNSS204
FacultySciences
SchoolInformatics
Cycle / Level2nd / Postgraduate
Teaching PeriodSpring
CoordinatorPetros Nikopolitidis
CommonYes
StatusActive
Course ID600016167

Programme of Study: PMS DIKTYA EPIKOINŌNIŌN KAI ASFALEIA SYSTĪMATŌN (2018 éōs sīmera) PF

Registered students: 17
OrientationAttendance TypeSemesterYearECTS
Díktya EpikoinōniṓnElective Courses217.5
Asfáleia SystīmátōnCompulsory Course belonging to the selected specialization (Compulsory Specialization Course)217.5

Class Information
Academic Year2022 – 2023
Class PeriodSpring
Faculty Instructors
Instructors from Other Categories
Weekly Hours3
Class ID
600224044
Course Type 2021
Specific Foundation
Course Type 2011-2015
Specific Foundation / Core
Mode of Delivery
  • Face to face
  • Distance learning
Digital Course Content
Erasmus
The course is also offered to exchange programme students.
Learning Outcomes
Cognitive: Understanding of cryptography and cryptanalysis, classical cryptography, symmetric cryptography, asymmetric cryptography, network and internet security protocols, systems security, systems threat management, security identification and vulnerabilities, Security policies, introduction to justice systems, economic, legal and ethical issues in systems security. Skills: Acquire in-depth knowledge of the field of network security, solving exercises based on theory, implementation of laboratory exercises
General Competences
  • Apply knowledge in practice
  • Retrieve, analyse and synthesise data and information, with the use of necessary technologies
  • Adapt to new situations
  • Make decisions
  • Work autonomously
  • Work in teams
  • Generate new research ideas
  • Be critical and self-critical
  • Advance free, creative and causative thinking
Course Content (Syllabus)
ntroduction, cryptography and cryptanalysis techniques, classical cryptography, symmetric cryptography, asymmetric cryptography, network and internet security protocols, systems security, systems threat management, security identification and vulnerabilities, Security policies, introduction to justice systems, economic, legal and ethical issues in systems security.
Educational Material Types
  • Notes
  • Interactive excersises
Use of Information and Communication Technologies
Use of ICT
  • Use of ICT in Course Teaching
  • Use of ICT in Laboratory Teaching
  • Use of ICT in Communication with Students
Description
PC and software for lab exercises. Laptop for teaching. Web page for communicating course content to students.
Course Organization
ActivitiesWorkloadECTSIndividualTeamworkErasmus
Lectures33
Laboratory Work66
Reading Assigment33
Written assigments87
Exams6
Total225
Student Assessment
Description
Final exam (40%), midetrm exam (20%), project grade (20%), lab grade (10%), programming assignment grade (10%)
Student Assessment methods
  • Written Exam with Extended Answer Questions (Summative)
  • Written Assignment (Summative)
  • Labortatory Assignment (Summative)
  • midterm exam (Summative)
Bibliography
Course Bibliography (Eudoxus)
Notes of the course Study of Journal and conference papers
Additional bibliography for study
1. W. Stallings , “Cryptography and Network Security” – Fifth Edition, Prentice Hall, 2011 2. K.Lam, D.LeBlanc, B.Smith, “Assessing Network Security”, Microsoft Press, 2004. 3. J.Kizza, F.M.Kizza, “Securing the Information Infrastructure”, IGI Global, 2008. 4. Σ.Κάτσικας, Δ.Γκρίτζαλης, Σ.Γκρίτζαλης, «Ασφάλεια Πληροφοριακών Συστημάτων», Εκδόσεις Νέων Τεχνολογιών, 2004. 5. Nigel Smart, Introduction to Cryptography (https://www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf)
Last Update
27-01-2024