Subject: Information Security (17 - SEN01)


Basic Information

CategoryTheoretical-methodological
Scientific or art field:Applied Computer Science and Informatics
InterdisciplinaryNo
ECTS5
Native organizations units

Course native organizational units not found!
Course specification

Course is active from 25.07.2017..

Students learn about the application of techniques and methods for the protection of data.
Knowledge of methods and technologies for data protection. The studenta are able to use cryptographic methods and technologies, create a software for data protection in electronic business system, design and implement mechanisms for authentication and access control.
Cryptography: introduction, basic concepts, cryptographic protocols, algorithms, digital signatures, digital certificates. Symmetric and asymmetric encryption algorithms, hash functions, key exchange. Cryptographic standards. PKI infrastructure: key management, establishment of PKI, certificate authorities, hierarchy of certificate authorities. Security of XML documents: digital signatures, encryption, web services security. Smart card technology: organization, standards and use. Application of security concepts at the level of operating systems, databases, and computer networks. Authentication: single-factor authentication, two-factor authentication, passwords, challenge-response principle, attacks, Kerberos, HTTP authentication. Access control: concepts, elements, policies, mechanisms and models of access control. Threat modeling.
Lectures. Computer practice. Consultations. The examination is oral. The final grade is formed on the basis of achievement in the laboratory practice classes and oral examination.
AuthorsNameYearPublisherLanguage
B. Schneier Applied Cryptography Protocols, Algorithms, and Source Code in C 1995 Wiley, New York English
William StallingsCryptography and Network security Principles and Ppractice, 6th Edition2014Pearson Education, Prentice HallEnglish
David F. Ferraiolo, D. Richard Kuhn, Ramaswamy ChandramouliRole-Based Access Control, Second Edition2007Artech HouseEnglish
Blake DournaeeXML Security2002McGraw-HillEnglish
Cherry, D.The Basics of Digital Privacy2014ElsevierEnglish
Andress, A.The Basics of Information Security2014ElsevierEnglish
Young, C.S.Information Security Science2016ElsevierEnglish
Fell, G., Barlow, M.Not All Data Is Created Equal2016O ReillyEnglish
Burney, S., Burney, S.Security and Frontend Performance2017O ReillyEnglish
Course activity Pre-examination ObligationsNumber of points
Project defenceYesYes50.00
Oral part of the examNoYes50.00
Name and surnameForm of classes
Missing picture!

Sladić Goran
Full Professor

Lectures
Missing picture!

Vidaković Dragan
Assistant - Master

Computational classes
Missing picture!

Todorović Nenad
Assistant - Master

Computational classes
Missing picture!

Kovačević Ivana
Assistant - Master

Computational classes