TKK | Networking Laboratory | Studies | S-38.3153

S-38.3153 Security in Communications Protocols, spring 2007

The course focus

Information security is a large, multi-disciplined area of art and science. It ranges from mathematical methods of cryptology to strength of materials; from nanoscale details of semiconductors to psychology; from legal code to economy.

In a four credit course it is impossible to cover even a small part of this all. The course is a introductory course that will cover basic consepts. After the basics have been introduced, the course will focus on network perspective of security. What is the security when observerd from the network and what can be done in network to improve security.

The course is designed as much as possible on less is more principle so that the course is not breathtaking collection of nice-to-know details, legacy information, techincal details and terminology but provides solid base on that networking expert can build ones competence. For example, cryptology is not covered on this course excluding basic concepts needed to understand other concpets. Physical security is only slightly touched on regulatory requirements.

Other courses and their relation to this one

There exists several network and security related courses in TKK. The following list states some of those and gives a short description how this course (S-38.3153) and the other course relate to each one.

S-38.3188
Basic networking course. Required advance information to understand concepts in this course.
S-38.3192
A course about how to run ISP. Recommended course to study together this course as it will give insigth about other factors related to run ISP. This S-38.3153 includes all security related issues earlier in S-38.(3)192 and removed from that to avoid expanding the later.
T-110.4200
Another basic course on computer security. Has focus more on end systems, but the content overlaps still much (approximately 50-75%). For study perspective, the courses are equavalent and both courses cannot be included to a degree. Note, that there is an English version of that course T-110.4206.
T-110.5210
Course on cryptology.

Schedule

Lectures will be held in hall S3 on Tuesdays from 8-12. The first lecture is at 13th March 2007. Lectures will be held in Finnish but all course material is available in English. There will be 12 lectures. Lecture topics are still subject to change, but time schedule is available.

Material

The course is not strictly based on any specific book. There are several books that cover basics of computer and networking security. These books include (in order of lecturer's preference):

  1. Ross Anderson: Security Engineering — A Guide to Building Dependable Distributed Systems. There exists also updates/errata to the book in the link above. The book is also available for download, but you should not print it out with TKK printers.
  2. Matt Bishop: Introduction to Computer Security
  3. Matt Bishop: Computer Security — Art and Science

Lecture slides will provide lecturer's view to course material, updates and course focus on this very broad area. Slides will be provided as paper copies by Edita Prima Opetusmonisteet. The slides are available also on course web pages in PDF format by at latest Monday afternoon before lecture. Note that you are not allowed to print lecture slides using TKK printers, you must use your own if you want to print those. The material will be partly updated and reorganised from the previous years.

Additional resources will be provided as paper copies by Opetusmonisteet. This material will be provided also as links from course pages (some material might be available only from TKK computers -- hut.fi / tkk.fi domain).

It is prohibited to print any course material using TKK printers. Use your own printer, if you print. One set (and only one) of material will be provided for self-service copying by course bulletin board in G2 wing. If this set disappears, no another set will be provided. So borrow it only for time needed for copying.

Course requrements

To complete the course, one needs to take the exam (first one 8th May at 13-16 hall S3).

How to read for the exam

One can look for earlier exams to find out what kind of questions are asked earlier. One should note that each year some new material is introduced and may be asked in exam. As recommended books have a bit different focus compared to one of course, one can use lecture slides to find focus areas. Just reading lecture slides instead does not provide sufficient background that is needed.

Following is a list of chapters in Ross Anderson: Security Engineering — A Guide to Building Dependable Distributed Systems that are relevant in this course. On some topic areas the book goes much more deep in details than required.

Personnel

Lectures are given by TkL Markus Peuhkuri.


This page is maintained by Webmaster and Markus Peuhkuri.
Last update on the page 2007-04-29 22:08
URL: http://www.netlab.tkk.fi/opetus/s383153/k2007/index.shtml
[TKK > Electrical and Communications Engineering > Studies ]