tanszek:oktatas:computer_system_security
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tanszek:oktatas:computer_system_security [2023/05/29 07:56] – [Test Questions] superuser | tanszek:oktatas:computer_system_security [2025/03/19 13:51] (current) – [Handouts] ohornyak | ||
---|---|---|---|
Line 4: | Line 4: | ||
* Data loss and corruption | * Data loss and corruption | ||
* User authentication methods, Passwords, encryption. | * User authentication methods, Passwords, encryption. | ||
- | * Protection of privacy, destruction of data | + | * Protection of privacy |
* Network security knowledge: protocols, devices, network attacks | * Network security knowledge: protocols, devices, network attacks | ||
- | | + | * Ethical hacking |
- | | + | |
* Design and implement secure applications | * Design and implement secure applications | ||
Line 19: | Line 18: | ||
^ Week # ^ Lecture | ^ Week # ^ Lecture | ||
| Week 1 | Basic concepts | | Week 1 | Basic concepts | ||
- | | Week 2 | Security design principles| | + | | Week 2 | Security design principles| |
- | | Week 3 | Introduction to Kali Linux | Basic commands | + | | Week 3 | Security design walkthrough| Functional and architectural design of coding task 2.| |
- | | Week 4 | Working with Kali Linux | Introduction to Python| | + | | Week 4 | Introduction to Kali Linux | Basic commands |
- | | Week 5 | Python security tools| | + | | Week 5 | Working with Kali Linux | Coding - safe logon and user management |
- | | Week 6 | Bank Holiday| Bank Holiday| | + | | Week 6 | Python security tools| |
- | | Week 7 | Malicious code| Virus and malwae checking tools| | + | | Week 8 | Bank Holiday| Bank Holiday| |
- | | Week 8 | Hashing function | + | | Week 9 | Malicious code| Virus and malwae checking tools| |
+ | | Week 10 | ||
+ | | Week 11 | Security coding walkthrough | Coding task pre-evaluation | | ||
+ | | Week 12 | Test | coding task pre-evaluation | | ||
+ | | Week 13 | Presentations of coding assignments| Presentations of coding assignments | | ||
+ | | Week 13 | Evaluation| Presentations of coding assignments| | ||
Line 49: | Line 53: | ||
+ | |||
+ | ===== Task ===== | ||
+ | |||
+ | **Objective: | ||
+ | The objective of this task is to design, implement, and analyze a secure file storage system. The system should ensure the confidentiality, | ||
+ | |||
+ | 1. System Design: | ||
+ | Define the requirements and functionalities of the secure file storage system. | ||
+ | Design the architecture, | ||
+ | Clearly outline the security objectives (confidentiality, | ||
+ | Encryption Implementation: | ||
+ | |||
+ | 2. Algorithms: | ||
+ | Choose a suitable encryption algorithm(s) for securing stored files. | ||
+ | Implement encryption and decryption mechanisms to protect the confidentiality of files. | ||
+ | Discuss the key management strategy to securely handle encryption keys. | ||
+ | |||
+ | 3. Access Control and Authentication: | ||
+ | Implement access controls to restrict file access based on user roles and permissions. | ||
+ | Integrate a robust authentication mechanism to verify the identity of users. | ||
+ | Consider multi-factor authentication for enhanced security. | ||
+ | |||
+ | 4. Audit Trail and Logging: | ||
+ | Implement logging mechanisms to record user activities and file access. | ||
+ | Create an audit trail for monitoring and analysis of security incidents. | ||
+ | Discuss how the audit trail can be used for forensic purposes. | ||
+ | |||
+ | 5.Data Integrity and Redundancy: | ||
+ | Implement mechanisms to ensure the integrity of stored files. | ||
+ | Explore techniques for redundancy and data backup to ensure availability. | ||
+ | Discuss the recovery plan in case of data loss or system failure. | ||
+ | |||
+ | 6. User Interface and User Experience: | ||
+ | Develop a user-friendly interface for uploading, downloading, | ||
+ | Ensure that the user interface promotes security best practices and guides users on secure behavior. | ||
+ | |||
+ | 7.Security Analysis: | ||
+ | Conduct a thorough security analysis of the implemented system. | ||
+ | Perform penetration testing to identify vulnerabilities and propose mitigation strategies. | ||
+ | Provide a detailed report on the overall security posture of the system. | ||
+ | |||
+ | |||
+ | 8. Documentation and Presentation: | ||
+ | Document the entire design and implementation process. | ||
+ | Prepare a presentation highlighting key features, security measures, and the rationale behind design choices. | ||
+ | |||
+ | **Evaluation Criteria:** | ||
+ | |||
+ | __Functionality (30%)__: | ||
+ | Successful implementation of encryption, access controls, and authentication. | ||
+ | File upload/ | ||
+ | Proper error handling and user feedback. | ||
+ | |||
+ | __Security Measures (30%):__ | ||
+ | Effectiveness of encryption techniques. | ||
+ | Robustness of access controls and authentication. | ||
+ | Quality of logging and audit trail. | ||
+ | |||
+ | __User Interface (15%)__: | ||
+ | User-friendly design. | ||
+ | Clarity in guiding users on secure practices. | ||
+ | |||
+ | __Security Analysis (15%):__ | ||
+ | Thoroughness of security analysis. | ||
+ | Effectiveness of mitigation strategies. | ||
+ | |||
+ | __Documentation and Presentation (10%):__ | ||
+ | Clarity and completeness of documentation. | ||
+ | Quality of the presentation and ability to articulate key points. | ||
===== Handouts ===== | ===== Handouts ===== | ||
- | - {{tanszek: | + | |
- | - {{tanszek: | + | |
- | - [[https:// | + | - {{tanszek: |
- | - [[https:// | + | - {{ : |
- | - {{tanszek: | + | - [[https:// |
- | - {{tanszek: | + | - [[https:// |
- | - {{tanszek: | + | - {{tanszek: |
+ | - {{tanszek: | ||
+ | - {{tanszek: | ||
===== Test Questions ===== | ===== Test Questions ===== | ||
Line 80: | Line 155: | ||
- What are Malicious software ? What Harm do they cause ? What are the prevention actions you recommend? | - What are Malicious software ? What Harm do they cause ? What are the prevention actions you recommend? | ||
- Explain network penetration testing | - Explain network penetration testing | ||
- | - | + | - Define Fundamental Security Design Principles |
tanszek/oktatas/computer_system_security.1685346992.txt.gz · Last modified: 2023/05/29 07:56 by superuser