tanszek:oktatas:szoftverrendszerek_biztonsaga
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tanszek:oktatas:szoftverrendszerek_biztonsaga [2024/03/23 13:35] – superuser | tanszek:oktatas:szoftverrendszerek_biztonsaga [2025/02/12 08:04] (current) – [Oktatási anyagok] ohornyak | ||
|---|---|---|---|
| Line 15: | Line 15: | ||
| - | ===== Schedule | + | ===== Ütemterv |
| ^ Week # ^ Lecture | ^ Week # ^ Lecture | ||
| - | | Week 1 | + | | Week 1 |
| - | | Week 2 | + | | Week 2 |
| - | | Week 3 | + | | Week 3 |
| - | | Week 4 | + | | Week 4 | Kali Linux |
| - | | Week 5 | + | | Week 5 | Kali linux eszközök |
| - | | Week 6 | + | | Week 6 |
| | Week 8 | Bank Holiday| Bank Holiday| | | Week 8 | Bank Holiday| Bank Holiday| | ||
| | Week 9 | Malicious code| Virus and malwae checking tools| | | Week 9 | Malicious code| Virus and malwae checking tools| | ||
| - | | Week 10 | Cryptography | + | | Week 10 | Kriptográfiai algoritmusok 1 | Jelszavak tárolása| |
| - | | Week 11 | Security coding walkthrough | + | | Week 11 | Kriptográfiai algoritmusok 2 | Digitális aláírás |
| - | | Week 12 | Test | coding task pre-evaluation | + | | Week 12 | Kriptográfiai algoritmusok 3 | Kódolási gyakorlat |
| - | | Week 13 | Presentations of coding assignments| Presentations of coding assignments | + | | Week 13 | Személyes adatok biztonsága |
| - | | Week 14 | Evaluation| Presentations of coding assignments| | + | | Week 14 | Etikus hackelés |
| - | ===== Textbooks | + | ===== Kötelező |
| + | Hornyák Olivér: {{ : | ||
| + | |||
| + | |||
| + | ===== Ajánlott irodalom | ||
| * Stallings, W., Brown, L. (2015): Computer security: principles and practice 3rd edition, Pearson Education, 978-0-13-377392-7 | * Stallings, W., Brown, L. (2015): Computer security: principles and practice 3rd edition, Pearson Education, 978-0-13-377392-7 | ||
| Line 48: | Line 52: | ||
| * Kevin Mitnick: The Art of Invisibility | * Kevin Mitnick: The Art of Invisibility | ||
| * Chris Wysopal: Art of Software Security Testing, The Identifying Software Security Flaws, ISBN 0321304861 | * Chris Wysopal: Art of Software Security Testing, The Identifying Software Security Flaws, ISBN 0321304861 | ||
| + | * Muha Lajos; Krasznay Csaba: Az elektronikus információs rendszerek biztonságának menedzselése | ||
| Line 57: | Line 62: | ||
| - | ===== Handouts | + | ===== Oktatási anyagok |
| - {{tanszek: | - {{tanszek: | ||
| - {{tanszek: | - {{tanszek: | ||
| Line 65: | Line 70: | ||
| - {{tanszek: | - {{tanszek: | ||
| - {{tanszek: | - {{tanszek: | ||
| + | - {{tanszek: | ||
| + | ===== Ellenőrző kérdések ===== | ||
| - | ===== Test Questions ===== | + | - Határozza meg a számítógépes biztonság fogalmát |
| - | + | | |
| - | | + | |
| - | - Explain Confidentiality, Integrity and Availability | + | |
| - | - What are the challenges in Computer Security | + | |
| - | - Define attack types | + | |
| - | - Define Threats, Attacks, and Assets | + | |
| - | - Explain Security Requirements | + | |
| - | - Explain Fundamental Security Design Principles | + | |
| - | - Explain Computer Security Strategies | + | |
| - | - Define the basic concepts of cryptographic algorithms: Plaintext, Encryption algorithm, Secret key, Ciphertext, Decryption algorithm | + | |
| - | - Explain Message Authentication and Hash Functions | + | |
| - | - Explain Public-Key Encryption | + | |
| - | - Explain Digital Signatures and Key Management | + | |
| - | - How can public-key encryption be used to distribute | + | |
| - | - Explain | + | |
| - | - Explain | + | |
| - | - Explain | + | |
| - | - Explain Message Authentication Code | + | |
| - | - What are Malicious software | + | |
| - | - Explain network penetration testing | + | |
| - | - Define Fundamental Security Design Principles | + | |
tanszek/oktatas/szoftverrendszerek_biztonsaga.1711200948.txt.gz · Last modified: 2024/03/23 13:35 by superuser
