DM572: Networks and Cybersecurity
Study Board of Science
Teaching language: Danish or English depending on the teacher, but English if international students are enrolled
EKA: N330058102
Assessment: Second examiner: Internal
Grading: 7-point grading scale
Offered in: Odense
Offered in: Autumn
Level: Bachelor
STADS ID (UVA): N330058101
ECTS value: 10
Date of Approval: 18-04-2024
Duration: 1 semester
Version: Approved - active
Comment
The course is co-read with DM586: Networks and Cybersecurity (7,5 ECTS)
DM572 (10 ECTS) is removed from the Computer science study program (Bachelor), but is still offered to minor in computer science and as an elective for data science. E24 offers a 7.5 ECTS version of the course: DM586: Network and Cybersecurity (7.5 ECTS).
Entry requirements
Academic preconditions
Course introduction
The purpose of this course is to give an understanding of the issues involved in networks and in computer security, for prevention and detection of security problems.
The course builds on the knowledge acquired in the course DM550.
In relation to the competence profile of the degree it is the explicit focus of the course to:
- Give competence to: handle complex and development-oriented situations in academic and work settings and identify their own learning needs and to structure own learning in different learning environments
- Give skills to: make and justify decisions within the subject area, describe, formulate, and communicate problems and results to either peers and non-specialists or partners and users
- Provide knowledge about: principles for the design of computer hardware and operating systems, including distributed and parallel systems
Expected learning outcome
The learning objective of the network part of the course is that the student demonstrates the ability to:
- Explain basic network concepts and the structure of the internet
- Explain the metrics used to measure the performance of computer networks
- Explain application layer protocols such as HTTP, DNS, and SMTP
- Explain the functionality and interfaces for the application layer of the TCP/IP model and the functionality of DNS
- Explain the requirements for transport layer protocols, the difference between UDP and TCP, and how to secure TCP
- Explain functionality and interfaces for the network layer, IP, and basic routing algorithms as well as routing in the Internet.
- Explain functionality and interfaces for the link layer, including error detection, error correction, and multiple access channel protocols.
- Explain characteristic differences between wireless and non-wireless networks.
- Use a network traffic analyser to inspect and dissect network traffic.
The learning objective of the security part of the course is that the student demonstrates the ability to:
- Explain the basic cybersecurity concepts, including protection goals, assumptions, killchains, threat analyses, digital certificates and signatures, as well as symmetric and asymmetric cryptography.
- Explain all steps in the user access control procedure, types of authentication, attacks on authentication secrets, and alternatives to traditional text passwords.
- Explain the human factors in security and how they can be exploited in social engineering attacks in general and in the case of phishing in particular.
- Explain the basic privacy paradigms as well as the threats to data confidentiality, including OSINT, and how these threats can be countered using data anonymisation and privacy design practices.
- Use specialised tools to perform guessing attacks on password hash files and recover wifi passwords.
- Use attack trees as a modelling tool in threat analyses.
- Handle signed and encrypted emails.
- Perform anonymization of data sets.
Content
The following main topics are contained in the course: Layers in networks, basic network concepts, the TCP/IP model, network protocols, basic cryptography (symmetric and public key), key distribution and user authentication, transport level security, wireless network security, electronic mail security, intruders, malicious software, penetration testing, social engineering, human factors.
Literature
Examination regulations
Exam element a)
Timing
Autumn and January
Tests
Portfolio
EKA
N330058102
Assessment
Second examiner: Internal
Grading
7-point grading scale
Identification
Full name and SDU username
Language
Normally, the same as teaching language
Examination aids
Oplyses på kurset
ECTS value
10
Additional information
Portfolio exam consisting of two parts:
- A number of assignments - takes place during the coures
- Oral examination - takes place in januarr
Indicative number of lessons
Teaching Method
At the faculty of science, teaching is organized after the three-phase model ie. intro, training and study phase. These teaching activities are reflected in an estimated allocation of the workload of an average student as follows:
- Intro phase (lectures) - 39 hours
- Training phase: 26 hours, including 26 hours tutorials
The intro phase facilitates an introduction to new material and topics, which in the skills training phase are processed with exercises prepared at home and discussed in class to validate the acquired knowledge.
Activities during the study phase: Reading from text books, solving homeworks and applying acquired knowledge to practical projects.
Teacher responsible
Additional teachers
Name | Department | City | |
---|---|---|---|
Fabrizio Montesi | fmontesi@imada.sdu.dk | Institut for Matematik og Datalogi | |
Jacopo Mauro | mauro@imada.sdu.dk | Institut for Matematik og Datalogi | |
Robin Kaarsgaard Sales | kaarsgaard@imada.sdu.dk | Institut for Matematik og Datalogi |
Timetable
Administrative Unit
Team at Educational Law & Registration
Offered in
Recommended course of study
Transition rules
Transitional arrangements describe how a course replaces another course when changes are made to the course of study.
If a transitional arrangement has been made for a course, it will be stated in the list.
See transitional arrangements for all courses at the Faculty of Science.