Security & Management of Computer Systems (Theory)

Module Information

Module Semester:
Module Part:
Sub-Module Code:
Hours per Week:
Module ECTS Credits:
Available to ERASMUS Students:
Module Staff:

Module Objective

The course goal is to familiarize students with the basic principles and Services of an internet provider and encryption algorithms as well as their familiarity with security testing tools and management of these services.

Module Study Targets

Students should be able to:

  • Describe the management of a network
  • Explains services included in a network
  • Explains Essential functions and components of the network core
  • Examines Attacks on a network and its applications
  • Creates the network protection
  • Control the access and authentication (AAA)
  • Distinguish the basic concepts and definitions of cryptography and security
  • Explains Cryptography Public and Private Key
  • Manages Symmetric and Asymmetric Cryptography. Access Control. Identification and Management combines vulnerabilities and attacks
  • Planning applications (e-banking and e-payments, e-government and e-voting)

Module Acquired Abilities

  • Search, analysis and combination of data
  • Able to work independent
  • Decision making

Module Description

Managing a network, what management needs exist in a network and at what levels Services included in a network, applications and functions performed. Reference to DNS services, SMTP, POP, IMAP, WEB, FTP, NTP, LDAP, DialUP. Necessary functions and components of the core network (routing protocols, Firewalls, VPN, etc.). Attacks on a network and the applications, categories of attacks and effects on network operation. Network protection, protection in the operating system level, service protection. access control and authentication (AAA). Methods of control and management to monitor the safety and smooth running of a network and its services (SNMP, MIBs, NMS-OpenView, NetSight, RMON). Basic concepts and definitions of cryptography and security. Public Key Cryptography, description and definitions (DES, 3DES, etc.). Private Key cryptography (RSA, El Gamal, etc.). Symmetric and Asymmetric Cryptography. Access Control. Identification and Authentication (Message Authentication Code, passwords, biometric techniques, smart cards, access control lists). Public key infrastructure, digital signatures (hash functions, certificates, certification services). Examples of logging, syslog services, log collectors, log analysis, command line tools, NS lookup, SNMP-based tools. Intrusion Detection Systems. Manage vulnerabilities and attacks, application description (e-banking and e-payments, e-government and e-voting.

Module Student Evaluation

Written final exam (60%)

Laboratory exercises (40%)


  • Stuart McClure, Joel Scambray, George Kurtz, "Hacking Exposed", McGraw-Hill Osborne Media, 6th edition, 2009
  • Strebe Matthew, "Network Security Foundations", ISBN: 0782143741, Sybex, 2004
  • Ross & Morgan, "Network Security Essentials", ISBN: 0764525034, J. Wiley & Sons Inc., 2003
  • Fischer-Hubner, "IT Security & Privacy: Design & use of PR", ISBN:3540421424, Springer, 2001
  • Cheswick, "Firewalls and Internet Security", ISBN:0-201-63357-4, Addison Wesley, 1994
  • William Stallings, "SNMP, SNMPv2, and CMIP- The practical Guide to Network Management Standards", ISBN: 0-201-63331-0, Addison-Wesley, 1993