Course: Computer Viruses and Security

» List of faculties » FAI » AUIUI
Course title Computer Viruses and Security
Course code AUIUI/AEPVB
Organizational form of instruction Lecture + Tutorial
Level of course Master
Year of study not specified
Semester Winter
Number of ECTS credits 3
Language of instruction English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Malaník David, Ing. Ph.D.
Course content
- Artificial intelligence and life, self-replication structures (the game of life, Fredkins self-replication structure, von Neumann and the theory of self-replication automats). Artificial life and virtual universe (tierra, biomorfs, SBEAT, SBART, Eden SWIMBOOT). Artificial Life and Complex Systems. - Self-replication structure, finite automata and Turing machines. Virus definitions, common and different features of the biological virus. Classification of malicious code (viruses, adware, spyware, worms ,...) and its spreading code. HOAX. Generators viruses. - Malware code and its dependences on the environment (eg OS, file format, processor architecture, compilers, ...) - Methods of infection. Infections files (COM, EXE, API, MBR, DBR, infection ...), art (overwriting viruses, connecting with viruses, viruses, hollow, concealed point ...). Infection of memory, using suspension, swap viruses. - Basic defensive strategy of viruses. Scanning the memory trace, anti-debugging, armored viruses, retroviruses, defense against heuristic analysis, emulation and reversing disassembled, use undocumented functions. - Design and generation of viruses. Code of the virus encoded by viruses (decryptors, nonlinear decoding W95/fono, W95/Mad2736) oligomorphic viruses, polymorphic viruses, metamorphic viruses. Generators viruses. - Repetition of basics of computer networks. Network Eavesdropping. Security Web site. Scanning ports. - Google Hacking. Buffer overflow - buffer overflow. Windows Security accounts. - Spam and antispam. Spam definitions and history. Tools for fighting spam. Anti-spam strategies and tools for Windows and Linux. Bayesian classifier and SpamAssassin. Mail client and filters. - Phishing. Phishing subcategories as spam. Right, pishing and spyware. False identities, false identities and redirection. Phishing and Malware. Cracking. Protection Program. Anti - debug and anti - disasembly programs. Program protections. - Hacking I. The collection of information, an overview of scanning and scanning programs, network services and research. Operating systems and attack them. Mac OS X, Windows and Linux. - Computer networks and attacks on them. Survey networks, autonomous systems, network services. Wireless and network attacks. Firewall. - Attacks on the code, runs on the web. Preventing the incident. implementation of security policies and procedures. Investigation procedures and computer investigations. Trace data and network control. - Investigation of the OS, Windows, Unix, Web attacks, hacker tools. Computer viruses, antivirus and Artificial Intelligence

Learning activities and teaching methods
Lecturing
  • Participation in classes - 40 hours per semester
  • Home preparation for classes - 20 hours per semester
  • Preparation for course credit - 21 hours per semester
prerequisite
Knowledge
Knowledge from areas: Fundamentals of Informatics Computer networks
Knowledge from areas: Fundamentals of Informatics Computer networks
learning outcomes
Describe the basic orientation in the field of Cybersecurity.
Describe the basic orientation in the field of Cybersecurity.
Explain current threats in cyberspace.
Explain current threats in cyberspace.
List the types of attacks in cyberspace.
List the types of attacks in cyberspace.
Describe the rationale for implementing security policies.
Describe the rationale for implementing security policies.
Explain the use of infrastructure penetration testing.
Explain the use of infrastructure penetration testing.
Skills
Apply tools to identify vulnerabilities in the infrastructure.
Apply tools to identify vulnerabilities in the infrastructure.
Verify the security of a server or web application.
Verify the security of a server or web application.
Evaluate server security.
Evaluate server security.
Evaluate desktop security.
Evaluate desktop security.
Design and conduct an infrastructure penetration test.
Design and conduct an infrastructure penetration test.
teaching methods
Knowledge
Lecturing
Lecturing
assessment methods
Oral examination
Oral examination
Recommended literature
  • Lance J. Phishing bez záhad. Grada, 2007.
  • Merhaut F., Zelinka I. Úvod do počítačové bezpečnosti. Zlín, 2009.
  • Peter Szor. Počítačové viry - analýza útoku a obrana. Zoner Press.
  • Pokorný J. Hacking - umění exploitace. Zoner Press.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester