tanszek:oktatas:computer_system_security
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tanszek:oktatas:computer_system_security [2023/05/29 07:56] – [Test Questions] superuser | tanszek:oktatas:computer_system_security [2025/03/19 13:51] (current) – [Handouts] ohornyak | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| * Data loss and corruption | * Data loss and corruption | ||
| * User authentication methods, Passwords, encryption. | * User authentication methods, Passwords, encryption. | ||
| - | * Protection of privacy, destruction of data | + | * Protection of privacy |
| * Network security knowledge: protocols, devices, network attacks | * Network security knowledge: protocols, devices, network attacks | ||
| - | | + | * Ethical hacking |
| - | | + | |
| * Design and implement secure applications | * Design and implement secure applications | ||
| Line 19: | Line 18: | ||
| ^ Week # ^ Lecture | ^ Week # ^ Lecture | ||
| | Week 1 | Basic concepts | | Week 1 | Basic concepts | ||
| - | | Week 2 | Security design principles| | + | | Week 2 | Security design principles| |
| - | | Week 3 | Introduction to Kali Linux | Basic commands | + | | Week 3 | Security design walkthrough| Functional and architectural design of coding task 2.| |
| - | | Week 4 | Working with Kali Linux | Introduction to Python| | + | | Week 4 | Introduction to Kali Linux | Basic commands |
| - | | Week 5 | Python security tools| | + | | Week 5 | Working with Kali Linux | Coding - safe logon and user management |
| - | | Week 6 | Bank Holiday| Bank Holiday| | + | | Week 6 | Python security tools| |
| - | | Week 7 | Malicious code| Virus and malwae checking tools| | + | | Week 8 | Bank Holiday| Bank Holiday| |
| - | | Week 8 | Hashing function | + | | Week 9 | Malicious code| Virus and malwae checking tools| |
| + | | Week 10 | ||
| + | | Week 11 | Security coding walkthrough | Coding task pre-evaluation | | ||
| + | | Week 12 | Test | coding task pre-evaluation | | ||
| + | | Week 13 | Presentations of coding assignments| Presentations of coding assignments | | ||
| + | | Week 13 | Evaluation| Presentations of coding assignments| | ||
| Line 49: | Line 53: | ||
| + | |||
| + | ===== Task ===== | ||
| + | |||
| + | **Objective: | ||
| + | The objective of this task is to design, implement, and analyze a secure file storage system. The system should ensure the confidentiality, | ||
| + | |||
| + | 1. System Design: | ||
| + | Define the requirements and functionalities of the secure file storage system. | ||
| + | Design the architecture, | ||
| + | Clearly outline the security objectives (confidentiality, | ||
| + | Encryption Implementation: | ||
| + | |||
| + | 2. Algorithms: | ||
| + | Choose a suitable encryption algorithm(s) for securing stored files. | ||
| + | Implement encryption and decryption mechanisms to protect the confidentiality of files. | ||
| + | Discuss the key management strategy to securely handle encryption keys. | ||
| + | |||
| + | 3. Access Control and Authentication: | ||
| + | Implement access controls to restrict file access based on user roles and permissions. | ||
| + | Integrate a robust authentication mechanism to verify the identity of users. | ||
| + | Consider multi-factor authentication for enhanced security. | ||
| + | |||
| + | 4. Audit Trail and Logging: | ||
| + | Implement logging mechanisms to record user activities and file access. | ||
| + | Create an audit trail for monitoring and analysis of security incidents. | ||
| + | Discuss how the audit trail can be used for forensic purposes. | ||
| + | |||
| + | 5.Data Integrity and Redundancy: | ||
| + | Implement mechanisms to ensure the integrity of stored files. | ||
| + | Explore techniques for redundancy and data backup to ensure availability. | ||
| + | Discuss the recovery plan in case of data loss or system failure. | ||
| + | |||
| + | 6. User Interface and User Experience: | ||
| + | Develop a user-friendly interface for uploading, downloading, | ||
| + | Ensure that the user interface promotes security best practices and guides users on secure behavior. | ||
| + | |||
| + | 7.Security Analysis: | ||
| + | Conduct a thorough security analysis of the implemented system. | ||
| + | Perform penetration testing to identify vulnerabilities and propose mitigation strategies. | ||
| + | Provide a detailed report on the overall security posture of the system. | ||
| + | |||
| + | |||
| + | 8. Documentation and Presentation: | ||
| + | Document the entire design and implementation process. | ||
| + | Prepare a presentation highlighting key features, security measures, and the rationale behind design choices. | ||
| + | |||
| + | **Evaluation Criteria:** | ||
| + | |||
| + | __Functionality (30%)__: | ||
| + | Successful implementation of encryption, access controls, and authentication. | ||
| + | File upload/ | ||
| + | Proper error handling and user feedback. | ||
| + | |||
| + | __Security Measures (30%):__ | ||
| + | Effectiveness of encryption techniques. | ||
| + | Robustness of access controls and authentication. | ||
| + | Quality of logging and audit trail. | ||
| + | |||
| + | __User Interface (15%)__: | ||
| + | User-friendly design. | ||
| + | Clarity in guiding users on secure practices. | ||
| + | |||
| + | __Security Analysis (15%):__ | ||
| + | Thoroughness of security analysis. | ||
| + | Effectiveness of mitigation strategies. | ||
| + | |||
| + | __Documentation and Presentation (10%):__ | ||
| + | Clarity and completeness of documentation. | ||
| + | Quality of the presentation and ability to articulate key points. | ||
| ===== Handouts ===== | ===== Handouts ===== | ||
| - | - {{tanszek: | + | |
| - | - {{tanszek: | + | |
| - | - [[https:// | + | - {{tanszek: |
| - | - [[https:// | + | - {{ : |
| - | - {{tanszek: | + | - [[https:// |
| - | - {{tanszek: | + | - [[https:// |
| - | - {{tanszek: | + | - {{tanszek: |
| + | - {{tanszek: | ||
| + | - {{tanszek: | ||
| ===== Test Questions ===== | ===== Test Questions ===== | ||
| Line 80: | Line 155: | ||
| - What are Malicious software ? What Harm do they cause ? What are the prevention actions you recommend? | - What are Malicious software ? What Harm do they cause ? What are the prevention actions you recommend? | ||
| - Explain network penetration testing | - Explain network penetration testing | ||
| - | - | + | - Define Fundamental Security Design Principles |
tanszek/oktatas/computer_system_security.1685346992.txt.gz · Last modified: 2023/05/29 07:56 by superuser
