This course is delivered in the Computer Science BSc program in the 6th semester. The
official syllabus is available on the faculty's
web site. On this page, you will find operative information related to the course. Lecture slides
are available in the Moodle system of the department.
Information about on-line forms of teaching the course IT Security
Teaching of the course IT Security (vihiac01 English) will be continued using on-line methods from the week of March 23, 2020, as follows:
We will pre-record the lectures and make the recording available both in audio and video forms. The slides in PDF format will be available in the Moodle system of the department as before. In addition to the slides, we put in Moodle a URL pointing to the audio material and a URL pointing to the video of the lecture. Tha audio material will be stored on our local lab server, while the video will be made available via Youtube. The PDF of the slides and the audio will be small enough to be able to download and use them in an off-line manner. Youtube will need on-line connection obviously.
At the regular scheduled time intervals of the lecture, we will hold an on-line consultation using
MS Teams. Those who want to participate at this consultation should get familiar with the course
material (see above) before the consultation, and use the consultation to ask questions. Questions
can also be sent to the lecturers before the consultation by sending e-mail to email@example.com.
The lecturer will prepare for answering the received questions and begin the consultation with
discussing those questions. Then (s)he will respond to any further questions received during the
consultation via the chat panel of the Teams meeting. The consultiations will be held in the third
45 min of the scheduled time interval of the course, i.e., 12pm-1pm, on every Thursday. The first
2x45 min can be used to study the pre-recorded and distributed course material. It is not mandatory
to participate at these consultations; use the opportunity wisely.
Nothing is changed with respect to the homework, the challenges should be solved and solutions should be submitted in the same way as before.
The test towards the end of the semester was planned to be a Moodle test from the beginning. However, to complete the test, you should not come to the university, but the test will be done from home now. More information on this will be distributed in due time. It is clear that we will not be able to check and detect potential cheating, so I remind you to engineering ethics I was talking about at the first lecture. Cheating is unfair with those who don't cheat, it is morally unacceptable and it should be avoided.
We will continue to use broadcast Neptun messages as an official form of communication with you, however we advise you to watch also the web site of the course and the course's Moodle.
There will surely be glitches, we ask you to be patient and cooperative. We make all efforts to finish this semester as efficiently and effectively as possible.
This course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using computing systems. The course prepares BSc students for security challenges that they may encounter during their professional career, and at the same time, it provides a basis for those student who want to comtinue their studies at MSc level. We put special emphasis on software security and the practical aspects of developing secure programs.
1 homework assignment (consisting in multiple challenges) and 1 test.
P = T + H, where T is the points obtained on the test (min 20, max 50 points) and H is the points obtained for the
homework (min 20, max 50 points).
excellent (5): P >= 85 points;
good (4): P >= 70 points;
satisfactory (3): P >= 55 points;
pass (2): P >= 40 points;
fail (1): P < 40 points.
Megbeszélés szerint, az előadóval előre egyeztetett időpontban.
Please contact the lecturer to schedule an appointment.
|Introduction to IT security
|History of cryptography
|Applied modern cryptography
|Malware and botnets
|User authentication and access control
|--- Spring Break ---
|Futóné Papp D.
|Memory corruption attacks and countermeasures
|Mobile and cloud security
|Gazdag A., Ládi G.
|Network security (offensive side)
|Network security (defensive side)
|Privacy issues and PETs
|Economics of security and privacy
The homework assignment for the semester will be available on the avatao.com platform. You should use this platform to access the challenges of the assignment. However, solutions must be submitted via the Moodle system of the department. The challenges are related to the topics covered by the course. We recommend that you first try to solve every challenge on your own, without any help. However, if you get stuck, you can look at the hints available for each challenge and read part of the solution, or the whole solution, if you wish. In other words, you can access the hints, read them, and solve the challenge with that help. We expect you to spend some time on this and don't ask your mates for the solution, as you can read and understand it yourself. We also hope that some of you will take the challenges as real challenges and try to solve them without the hints. Remember that you can learn the most by DOING it, not just listening and reading about it.
Cryptography: March 12, 2020.
User authentication: March 26, 2020.
Software security: April 9, 2020.
Memory corruption: April 23, 2020.
Web security: May 7, 2020.