Specializations

IT Security (MSc major specialization in the Computer Engineering program)

The IT Security major specialization introduces the main security problems of IT systems and the approaches, methods, and tools used to solve those problems. We put the emphasis on practical applications, while students also get familiar with the security analysis techniques and design principles through the analysis of different security solutions. Those who complete the IT Security major specialization are able to identify security problems in practical IT systems, analyze and understand such problems, and design and develop appropriate security solutions. The students also learn when and how to apply cryptography to practical security problems.

The IT Security major specialization consists of four courses (Software Security (VIHIMA21), Computer and Network Security (VIHIMA23), Cryptographic Protocols (VIHIMB08), Security of Machine Learning (VIHIMB09)) and two lab exercises (Software Security Laboratory (VIHIMA22), Computer and Network Security Laboratory (VIHIMB07)). We also supervise student semester and diploma projects.

In the past: IT Security (MSc minor specialization in the Computer Science program)

Semester and diploma projects

We offer semester and diploma projects that are related to the research activities in the lab, or proposed by our industrial partners, therefore, they provide the opportunity for the students to join our research and development projects, or collaborate with our industrial partners.

If you are a student interested in any of our current project proposals, please, get in touch with the given contact person of the project before officially applying. The contact person will let you know the necessary steps for taking the project officially.

Courses All | BSc | BProf | MSc | Elective

All | BSc | BProf | MSc | Elective

Security and Privacy: an Economic Approach (in English) (VIHIAV34)

Information security is as much an economic problem as it is technical. Even given flawless cryptographic protocols and the availability of perfectly secure software, the misaligned economic incentives of different stakeholders in a system often result in a (very) sub-optimal security level. By guiding you through the jungle of asymmetric information, interdependent security, correlated risk and other concepts characteristic for system security, this elective course will enable you to make better decisions in risk management, security investment and policy design on a system level. Furthermore, the course touches upon the economic aspects of data privacy, an emerging area of interest for users and companies in the big data era.

Topics: microeconomics, game theory, incentives, interdependent security, asymmetric information, correlated risk, risk management, security investments, spam, underground economy, information sharing on security breaches, bug bounty, cyber-insurance, (behavioral) economics of privacy, interdependent privacy

Privacy-Preserving Technologies (VIHIAV35)

This course provides a detailed overview of data privacy. It focuses on different privacy problems of web tracking, data sharing, and machine learning, as well as their mitigation techniques. The aim is to give the essential (technical) background knowledge needed to identify and protect personal data. These skills are becoming a must of every data/software engineer and data protection officer dealing with personal and sensitive data, and are also required by the European General Data Protection Regulation.

Topics: Dark Patterns (+ Cognitive Biases), (Web-)Tracking (+ Profiling), GDPR, Cryptography (Homomoprhic Encryption, Secret Sharing, ZeroKnowdloge Proofs, etc.), CryptoCurrencies, TOR, E-Voting, Machine Learning Privacy (Membership Inference, Fairness, etc.), Deanonymization (Relational-, Unstructured-, and Aggregate-data), Anonymization (K-Anonimity, Differential Privacy)

Cybersecurity Operations Fundamentals (VIHIAV43)

This is an elective lab exercise course where students learn the basics of security operations.

Topics: cyber attacks; security of Linux and Windows; network security; network defense; incident response.

Applied Cryptography (in English) (VIHIA030)

This course gives an introduction to the basics of cryptography, explains how basic building blocks work, and demonstrates how secure systems can be engineered by properly using them. Besides the theoretical background, we use lot of illustrative examples and show practical applications. In addition, besides the technical details, we give an outlook to the legal and business aspects of using cryptography. This course is offered only to students of the Aquincum Institute of Technology, Budapest.

In the past