Specializations

IT Security (MSc minor specialization in the Computer Science program)

The IT Security minor specialization introduces the main security problems of IT systems and the approaches, methods, and tools used to solve those problems. We put the emphasis on practical applications, while students also get familiar with the security analysis techniques and design principles through the analysis of different security solutions. Those who complete the IT Security minor specialization are able to identify security problems in practical IT systems, analyze and understand such problems, and design and develop appropriate security solutions. The students also learn when and how to apply cryptography to practical security problems.

The IT Security minor specialization consists of three courses (Cryptographic Protocols, Computer Security, and Network Security) and an IT Security Lab. We also supervise student semester and diploma projects.

Courses

IT Security (VIHIAC01)

This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional carrier, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.

Topics: IT security in practice; user authentication and access control basics; basic memory corruption attacks; secure programing methods and security testing of software; malware and malware detection; browser and web security; mobile and cloud security; network security, firewalls, and IDS systems; introduction to cryptography; cryptographic protocols; privacy protection; risk analysis and economics of security.

IT Security (in English) (VIHIAC01)

This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional carrier, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.

Topics: IT security in practice; user authentication and access control basics; basic memory corruption attacks; secure programing methods and security testing of software; malware and malware detection; browser and web security; mobile and cloud security; network security, firewalls, and IDS systems; introduction to cryptography; cryptographic protocols; privacy protection; risk analysis and economics of security.

Cryptographic Protocols (VIHIMA05)

This course introduces problems related to communication security in wired and wireless networks, describes the principles and practical implementations of modern security protocols that address those problems, and sheds light on protocol design issues through the detailed analysis of existing security protocols.

Topics: cryptographic primitives; block encryption modes; message authentication codes; random number generation; key exchange protocols; public key infrastructure; secure communication protocols (TLS, IPsec, WiFi security); secure protocols in resource constrained environments; anonymous communication systems; fair exchange.

Computer Security (VIHIMA06)

The course introduces security problems in computing systems, as well as the principles, practical mechanisms, and tools used to solve them. The term computer is interpreted in a broad sense, and it includes personal computers, servers, mobile devices, and embedded computers. The course covers physical security and OS level security of computers, software security issues at the application level, secure programming, and the problem of malicious software (malware).

Topics: operating systems security; memory corruption attacks and countermeasures; secure programming methods; malware techniques, detection, and analysis; security of mobile platforms; browser security issues; virtualization security; incident response and digital forensics; tamper resistance and physical security.

Network Security (VIHIMB00)

This course gives a detailed introduction into the security problems of computer networks, and it gives an overview of the possible solutions to those problems. It also covers issues related to secure operation of networks in practice, including modern tools and techniques used to ensure security. Students get theoretical knowledge and practical skills that form the basis of secure network operations, and allow them to assess security risks, understand threats and vulnerabilities, select and integrate appropriate security solutions, and to design new security mechanisms. The course also serves as a basis for obatining skills in penetration testing and ethical hacking of networks.

Topics: network penetration testing; firewalls; intrusion detection/prevention systems, SIEMs; IPv6 security; network forensics; honeypots; network infrastructure security (e.g., DNSSEC); botnets; web security; spam filtering; detection of DoS attacks; enterprise network security; industrial control network security; privacy on the web

IT Security Laboratory (VIHIMB01)

This laboratory extends and deepens the knowledge and skills obtained in the courses of the IT Security minor specialization by solving practical, hands-on exercises in real, or close-to-real environments.

Topics: access control in operating systems; software security (buffer overflow and format string attacks); malware analysis; security testing of network and web based systems; network traffic monitoring with sniffing; firewalls and application level proxies; network forensics; PKI and electronic signatures

Secure Software Development (VIHIAV33)

This course fills an important gap in the education of software engineers, namely developing secure software applications. During this course, students will learn the most common mistakes in software development and how attackers exploit those mistakes (offensive security). Then, students get to know how to mitigate attacks and write secure software applications.

Topics: secure coding in Java; secure coding in C#; web security; OWASP top 10; Javascript security; secure coding in python; Android security; secure design of authentication and authorization; secure API design; cryptography in software development; secure coding in C/C++; secure-by-design languages (Go, Rust)

Security and Privacy: an Economic Approach (in English) (VIHIAV34)

Information security is as much an economic problem as it is technical. Even given flawless cryptographic protocols and the availability of perfectly secure software, the misaligned economic incentives of different stakeholders in a system often result in a (very) sub-optimal security level. By guiding you through the jungle of asymmetric information, interdependent security, correlated risk and other concepts characteristic for system security, this elective course will enable you to make better decisions in risk management, security investment and policy design on a system level. Furthermore, the course touches upon the economic aspects of data privacy, an emerging area of interest for users and companies in the big data era.

Topics: microeconomics, game theory, incentives, interdependent security, asymmetric information, correlated risk, risk management, security investments, spam, underground economy, information sharing on security breaches, bug bounty, cyber-insurance, (behavioral) economics of privacy, interdependent privacy

Administering Security in Computer Networks (VIHIAV14)

This is an elective lab exercise course where students learn how to securely operate a network using mainly Cisco networking equipment.

Topics: security of network devices; authentication, authorization, accounting; firewalls; intrusion detection and prevention; secure local networks; introduction to cryptography; virtual private networks; network management; integrated VPN and firewall architectures.

Applied Cryptography (in English) (VIHIA030)

This course gives an introduction to the basics of cryptography, explains how basic building blocks work, and demonstrates how secure systems can be engineered by properly using them. Besides the theoretical background, we use lot of illustrative examples and show practical applications. In addition, besides the technical details, we give an outlook to the legal and business aspects of using cryptography. This course is offered only to students of the Aquincum Institute of Technology, Budapest.

Computernetzwerke (in German) (VIHIAB01)

Das Ziel des Kurses ist einen umfassenden Überblick über die Design-Prinzipien von Computernetzwerke und die Protokolle, die die heutige Internet-Kommunikation ermöglichen. Wir analysieren die wichtigsten Komponenten des TCP/IP Protokoll-Stack und wir diskutieren weit verbreiteten Internet-Anwendungen. Das Kurssyllabus enthält zusätzliche wichtige Themen wie Multimedia-Kommunikation und Sicherheit.

Topics: Internet structure, purpose, basic ideas; protocol layers and reference model; web, HTTP and other applications; email; domain name system; transport protocols, congestion control; datagrams; packet forwarding, Internet Protocol; routing; medium access control (MAC) principles and protocols; Ethernet; wireless networks, Wifi and cellular networks; security of applications, SSL and IPSec; multimedia communication.

In the past

  • Information Security (VIHIM100 and VIHIM102)
  • Security Protocols (VIHIM132)
  • Cryptography and its Applications (VIHIM133)
  • Foundations of Secure Electronic Commerce (VIHIM219)
  • Network Security in Practice (VIHIM327)
  • Security labs (VIHIM220 and VIHIM305)
  • Economics of Security and Privacy (VIHIAV15)

Semester and diploma projects

We offer semester and diploma projects that are related to the research activities in the lab, or proposed by our industrial partners, therefore, they provide the opportunity for the students to join our research and development projects, or collaborate with our industrial partners.

If you are a student interested in any of our current project proposals, please, get in touch with the given contact person of the project before officially applying. The contact person will let you know the necessary steps for taking the project officially.

Talent management

We pay special attention to attract and work with students interested in IT security. To discover talented students, we organize the annual CrySyS Security Challenge, which is a hacking contest with exciting problems to solve. For students, the Sec Challenge provides a platform for "learning by doing"; for us, it is a vehicle to discover students talented in hacking.

Those who achieve an outstanding result in the Sec Challenge are invited to join the CrySyS Student Core, which is an invite-only group of exceptionally talented people who proved their ability to solve security problems in a wide range of setups. Core members meet once a week to expand their knowledge by discussing specific topics in system and network security, to prepare for CTF competitions, to socialize, and in general, to have fun by spending time with other geeks of similar interest.

To help students preparing for the Sec Challenge and bootstrapping their IT security activity, we organize an IT Security Bootcamp. Interested in joining and becoming part of a live community? Contact Gábor Pék, CrySyS Student Core leader, or Levente Buttyán, head of the CrySyS Lab.

Members of the CrySyS Student Core formed the !SpamAndHex CTF team to participate at international hacking competitions. However, the team welcomes non-Core members as well. If you are a student, then this can be a great way to learn from Core members, improve your hacking skills, prove your talent, and ultimately, get invited to the CrySyS Student Core. Interested in joining the !SpamAndHex team? Contact Gábor Pék, CrySyS Student Core leader.

Avatao platform

Avatao is an online e-learning platform offering IT security challenges for everyone interested in improving their skills in computer security, web security, applied cryptography, and many more sub-domains of IT security. The development of the platform was started in the CrySyS Lab before it was spun off into a standalone company. However, we continue to use the Avatao platform in our teaching as the infrastructure for the CrySyS Security Challenge, as well as for course homeworks and lab exercises. If you are interested in avatao, please contact Mark Felegyhazi or Gabor Pek.