Course: Security of Operation Systems

« Back
Course title Security of Operation Systems
Course code AUPKS/AE8BO
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 4
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Oulehla Milan, Ing. Ph.D.
  • Sysel Martin, doc. Ing. Ph.D.
Course content
Topics: 1. Principles and goals of protection of modern operating systems 2. Objectives of protection (Hardware Objects, Software Objects) 3. Access Matrix and its implementation 4. Access Control Method 5. Revocation of access permissions 6. Other methods of protection (Auxiliary Rights, Rights Amplification and others) 7. Types of attacks and security threats 8. Software threats (Logic Bomb, Buffer Overflow and others) 9. System threats 10. Network communication threats 11. Cryptography as a tool for threat mitigation 12. Problems of data backups 13. Security aspects of the User Authentication process 14. Implementation of security measures

Learning activities and teaching methods
Lecturing, Exercises on PC
  • Participation in classes - 17 hours per semester
prerequisite
Knowledge
Basics of program development skills Knowledge of Linux operating system Knowledge of command line interpreter (e.g. Bash) Programing in Java language
Basics of program development skills Knowledge of Linux operating system Knowledge of command line interpreter (e.g. Bash) Programing in Java language
learning outcomes
Describe the issue of security policies
Describe the issue of security policies
Explain the principles of the potential threat model
Explain the principles of the potential threat model
Describe what belongs to the set of secure objects
Describe what belongs to the set of secure objects
Explain the confidentiality principle, the integrity principle and the availability principle
Explain the confidentiality principle, the integrity principle and the availability principle
Describe the theoretical framework related to attacks on operating systems
Describe the theoretical framework related to attacks on operating systems
Skills
Identify security issues arising from inconsistencies in rules
Identify security issues arising from inconsistencies in rules
Give examples of what needs to be included in a model of potential threats
Give examples of what needs to be included in a model of potential threats
Identify security issues related to untreated inputs
Identify security issues related to untreated inputs
Identify security issues related to local attacks on operating systems
Identify security issues related to local attacks on operating systems
Identify security issues related to malware attacks on operating systems
Identify security issues related to malware attacks on operating systems
teaching methods
Knowledge
Exercises on PC
Exercises on PC
Lecturing
Lecturing
assessment methods
Written examination
Written examination
Recommended literature
  • JAEGER, Trent. Operating system security. CA: Morgan & Claypool Publishers, 2008. ISBN 9781598292121.
  • OULEHLA, Milan a Roman JAŠEK. Moderní kryptografie průvodce světem šifrování. Praha: IFP Publishing s.r.o., 2017. ISBN 978-80-87383-67-4.
  • SILBERSCHATZ, Abraham., Peter B. GALVIN a Greg. GAGNE. Operating system concepts. New York: Wiley, 2013. ISBN 978-1-118-06333-0.
  • STALLINGS, William a Lawrie BROWN. Computer security: principles and practice. Boston: Pearson, 2015. ISBN 978-0133773927.
  • STALLINGS, William. Operating systems: internals and design principles. Boston: Pearson, 2015. ISBN 978-0133805918.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester