Computer system security

linfo2347  2024-2025  Louvain-la-Neuve

Computer system security
5.00 credits
30.0 h + 15.0 h
Q2
Teacher(s)
Language
Main themes
  • Forged E-Mail, Spam and Malwares,
  • Basics in cryptography,
  • Network and Application Vulnerabilities: IT spoofing, session hijacking, exploits, sniffing,
  • Firewalls,
  • Proxies, IDS, Hacking methods,
  • Secure communications,
  • Security at the User Level.
Learning outcomes

At the end of this learning unit, the student is able to :

1 Given the learning outcomes of the "Master in Computer Science and Engineering" program, this course contributes to the development, acquisition and evaluation of the following learning outcomes:
  • INFO1.1-3
  • INFO2.1-5
  • INFO5.2, INFO4-5
  • INFO6.1, INFO6.3, INFO6.4
Given the learning outcomes of the "Master [120] in Computer Science" program, this course contributes to the development, acquisition and evaluation of the following learning outcomes:
  • SINF1.M1
  • SINF2.1-5
  • SINF5.2, SINF4-5
  • SINF6.1, SINF6.3, SINF6.4
The course provides a broad view of computer system security that provides a general knowledge of the field for non-specialists and a base for future specialists.
Students completing successfully this course will be able to
  • defend the need for protection and security, and the role of ethical considerations in computer use,
  • identify security strengths and weaknesses in computer systems,
  • explain the problems addressed by digital forensics and outline the basic principles involved in its practice,
  • compare and contrast current methods for implementing security.
 
Content
The course provides an introduction to a wide range of security problems linked to computer networks and devices connected to such networks.
We will see the major attack mechanisms (Denial of Service, cache poisoning, XSS, code injection, etc.), as well as defense mechanisms such as encryption, firewalls, and intrusion detection. The latter includes state of the art signature based detection and machine-learning based anomaly detection. In the exercises, you will learn to perform such attacks, how to identify them, and how to secure a system against them.
Some topics addressed in previous years:
  • Code injection (including SQL injection and XSS)
  • DDoS attacks and reflection
  • Network monitoring with netflow and protection with firewalls
  • Intrusion detection systems
  • Introduction to cryptography and how it is used to secure network communication and DNS
Teaching methods
  • Lectures
  • Scientific readings
  • Practical lab sessions
  • Project activities
Evaluation methods
Mode of evaluation for the June session:
  • Exam (50% of the final mark)
  • Project activities in groups (40% of the final mark)
  • Individual project activity (10% of the final mark)
August session: The project activities (in groups and individual) cannot be done or redone for the August session and the student will keep the grades obtained for them in the June session with the weights for the final mark as indicated above. Not participating to the project activities at the dates indicated by the teacher will result in a zero mark for the respective part.
The teacher may request a student to go through an additional oral exam as a complement of the exam and/or of the project activities, in cases including, but not limited to, technical issues, or suspicion of irregularities.
Other information
You will need basic knowledge in network protocols, computer systems, and C programming, for example from the following courses:
  • Networks: LINFO1341 or LELEC2920
  • Computer systems and C: LINFO1252 or LINFO2241
Online resources
Teams and/or Moodle
Faculty or entity


Programmes / formations proposant cette unité d'enseignement (UE)

Title of the programme
Sigle
Credits
Prerequisites
Learning outcomes
Master [120] in Electrical Engineering

Master [120] in Computer Science and Engineering

Master [120] in Computer Science

Master [120] in Mathematical Engineering

Master [120] in Data Science Engineering

Master [120] in Data Science: Information Technology