tanszek:oktatas:szoftverrendszerek_biztonsaga
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tanszek:oktatas:szoftverrendszerek_biztonsaga [2024/03/23 13:35] – superuser | tanszek:oktatas:szoftverrendszerek_biztonsaga [2025/02/12 08:04] (current) – [Oktatási anyagok] ohornyak | ||
---|---|---|---|
Line 15: | Line 15: | ||
- | ===== Schedule | + | ===== Ütemterv |
^ Week # ^ Lecture | ^ Week # ^ Lecture | ||
- | | Week 1 | + | | Week 1 |
- | | Week 2 | + | | Week 2 |
- | | Week 3 | + | | Week 3 |
- | | Week 4 | + | | Week 4 | Kali Linux |
- | | Week 5 | + | | Week 5 | Kali linux eszközök |
- | | Week 6 | + | | Week 6 |
| Week 8 | Bank Holiday| Bank Holiday| | | Week 8 | Bank Holiday| Bank Holiday| | ||
| Week 9 | Malicious code| Virus and malwae checking tools| | | Week 9 | Malicious code| Virus and malwae checking tools| | ||
- | | Week 10 | Cryptography | + | | Week 10 | Kriptográfiai algoritmusok 1 | Jelszavak tárolása| |
- | | Week 11 | Security coding walkthrough | + | | Week 11 | Kriptográfiai algoritmusok 2 | Digitális aláírás |
- | | Week 12 | Test | coding task pre-evaluation | + | | Week 12 | Kriptográfiai algoritmusok 3 | Kódolási gyakorlat |
- | | Week 13 | Presentations of coding assignments| Presentations of coding assignments | + | | Week 13 | Személyes adatok biztonsága |
- | | Week 14 | Evaluation| Presentations of coding assignments| | + | | Week 14 | Etikus hackelés |
- | ===== Textbooks | + | ===== Kötelező |
+ | Hornyák Olivér: {{ : | ||
+ | |||
+ | |||
+ | ===== Ajánlott irodalom | ||
* Stallings, W., Brown, L. (2015): Computer security: principles and practice 3rd edition, Pearson Education, 978-0-13-377392-7 | * Stallings, W., Brown, L. (2015): Computer security: principles and practice 3rd edition, Pearson Education, 978-0-13-377392-7 | ||
Line 48: | Line 52: | ||
* Kevin Mitnick: The Art of Invisibility | * Kevin Mitnick: The Art of Invisibility | ||
* Chris Wysopal: Art of Software Security Testing, The Identifying Software Security Flaws, ISBN 0321304861 | * Chris Wysopal: Art of Software Security Testing, The Identifying Software Security Flaws, ISBN 0321304861 | ||
+ | * Muha Lajos; Krasznay Csaba: Az elektronikus információs rendszerek biztonságának menedzselése | ||
Line 57: | Line 62: | ||
- | ===== Handouts | + | ===== Oktatási anyagok |
- {{tanszek: | - {{tanszek: | ||
- {{tanszek: | - {{tanszek: | ||
Line 65: | Line 70: | ||
- {{tanszek: | - {{tanszek: | ||
- {{tanszek: | - {{tanszek: | ||
+ | - {{tanszek: | ||
+ | ===== Ellenőrző kérdések ===== | ||
- | ===== Test Questions ===== | + | - Határozza meg a számítógépes biztonság fogalmát |
- | + | | |
- | | + | |
- | - Explain Confidentiality, Integrity and Availability | + | |
- | - What are the challenges in Computer Security | + | |
- | - Define attack types | + | |
- | - Define Threats, Attacks, and Assets | + | |
- | - Explain Security Requirements | + | |
- | - Explain Fundamental Security Design Principles | + | |
- | - Explain Computer Security Strategies | + | |
- | - Define the basic concepts of cryptographic algorithms: Plaintext, Encryption algorithm, Secret key, Ciphertext, Decryption algorithm | + | |
- | - Explain Message Authentication and Hash Functions | + | |
- | - Explain Public-Key Encryption | + | |
- | - Explain Digital Signatures and Key Management | + | |
- | - How can public-key encryption be used to distribute | + | |
- | - Explain | + | |
- | - Explain | + | |
- | - Explain | + | |
- | - Explain Message Authentication Code | + | |
- | - What are Malicious software | + | |
- | - Explain network penetration testing | + | |
- | - Define Fundamental Security Design Principles | + |
tanszek/oktatas/szoftverrendszerek_biztonsaga.1711200948.txt.gz · Last modified: 2024/03/23 13:35 by superuser