Felhasználói eszközök

Eszközök a webhelyen


tanszek:oktatas:computer_system_security

Különbségek

A kiválasztott változat és az aktuális verzió közötti különbségek a következők.

Összehasonlító nézet linkje

Előző változat mindkét oldalon Előző változat
Következő változat
Előző változat
tanszek:oktatas:computer_system_security [2023/05/29 07:41]
superuser [Handouts]
tanszek:oktatas:computer_system_security [2024/02/27 06:54] (aktuális)
superuser [Handouts]
Sor 19: Sor 19:
 ^ Week #     ^ Lecture ​     ^ Labor          ^ ^ Week #     ^ Lecture ​     ^ Labor          ^
 | Week 1   | Basic concepts ​   | Labor usage, handouts requirements | | Week 1   | Basic concepts ​   | Labor usage, handouts requirements |
-| Week 2   | Security design principles| ​Design the security ​of Neptun system+| Week 2   | Security design principles| ​Functional and architectural design ​of coding task 1. 
-| Week 3   | Introduction to Kali Linux   | Basic commands ​       | +| Week 3   | Security design walkthrough| Functional and architectural design of coding task 2.| 
-| Week   | Working with Kali Linux    | Introduction to Python+| Week 4   | Introduction to Kali Linux   | Basic commands ​       | 
-| Week   | Python security tools| ​Writing Python code        | +| Week   | Working with Kali Linux    | Coding - safe logon and user management ​
-| Week   | Bank Holiday| Bank Holiday| +| Week   | Python security tools| ​Coding ​ - safe document storage ​       | 
-| Week   | Malicious code| Virus and malwae checking tools| +| Week   | Bank Holiday| Bank Holiday| 
-| Week 8   Hashing function ​| Kali password storing functions|+| Week   | Malicious code| Virus and malwae checking tools| 
 +| Week 10  ​Cryptography ​| Kali password storing functions
 +| Week 11  | Security coding walkthrough | Coding task pre-evaluation | 
 +| Week 12  | Test | coding task pre-evaluation | 
 +| Week 13  | Presentations of coding assignments| Presentations of coding assignments | 
 +| Week 13  | Evaluation| Presentations of coding assignments|
  
  
Sor 49: Sor 54:
  
  
 +
 +===== Task =====
 +
 +**Objective:​**
 +The objective of this task is to design, implement, and analyze a secure file storage system. The system should ensure the confidentiality,​ integrity, and availability of stored files. Additionally,​ students are required to explore and implement encryption techniques, access controls, and other security measures to protect sensitive data
 +
 +1. System Design: ​
 +Define the requirements and functionalities of the secure file storage system.
 +Design the architecture,​ specifying components such as servers, databases, and client interfaces.
 +Clearly outline the security objectives (confidentiality,​ integrity, availability).
 +Encryption Implementation:​
 +
 +2. Algorithms:
 +Choose a suitable encryption algorithm(s) for securing stored files.
 +Implement encryption and decryption mechanisms to protect the confidentiality of files.
 +Discuss the key management strategy to securely handle encryption keys.
 +
 +3. Access Control and Authentication:​
 +Implement access controls to restrict file access based on user roles and permissions.
 +Integrate a robust authentication mechanism to verify the identity of users.
 +Consider multi-factor authentication for enhanced security.
 +
 +4. Audit Trail and Logging:
 +Implement logging mechanisms to record user activities and file access.
 +Create an audit trail for monitoring and analysis of security incidents.
 +Discuss how the audit trail can be used for forensic purposes.
 +
 +5.Data Integrity and Redundancy:
 +Implement mechanisms to ensure the integrity of stored files.
 +Explore techniques for redundancy and data backup to ensure availability.
 +Discuss the recovery plan in case of data loss or system failure.
 +
 +6. User Interface and User Experience:
 +Develop a user-friendly interface for uploading, downloading,​ and managing files securely.
 +Ensure that the user interface promotes security best practices and guides users on secure behavior.
 +
 +7.Security Analysis:
 +Conduct a thorough security analysis of the implemented system.
 +Perform penetration testing to identify vulnerabilities and propose mitigation strategies.
 +Provide a detailed report on the overall security posture of the system.
 +
 +
 +8. Documentation and Presentation:​
 +Document the entire design and implementation process.
 +Prepare a presentation highlighting key features, security measures, and the rationale behind design choices.
 +
 +**Evaluation Criteria:**
 +
 +__Functionality (30%)__:
 +Successful implementation of encryption, access controls, and authentication.
 +File upload/​download functionality.
 +Proper error handling and user feedback.
 +
 +__Security Measures (30%):__
 +Effectiveness of encryption techniques.
 +Robustness of access controls and authentication.
 +Quality of logging and audit trail.
 +
 +__User Interface (15%)__:
 +User-friendly design.
 +Clarity in guiding users on secure practices.
 +
 +__Security Analysis (15%):__
 +Thoroughness of security analysis.
 +Effectiveness of mitigation strategies.
 +
 +__Documentation and Presentation (10%):__
 +Clarity and completeness of documentation.
 +Quality of the presentation and ability to articulate key points.
  
 ===== Handouts ===== ===== Handouts =====
Sor 74: Sor 148:
   - Explain Digital Signatures and Key Management   - Explain Digital Signatures and Key Management
   - How can public-key encryption be used to distribute a secret key?   - How can public-key encryption be used to distribute a secret key?
 +  - Explain DES algorithm ​
 +  - Explain AES algorithm
 +  - Explain MD5 algorithm
 +  - Explain Message Authentication Code
 +  - What are Malicious software ? What Harm do they cause ? What are the prevention actions you recommend?
 +  - Explain network penetration testing
 +  - Define Fundamental Security Design Principles
tanszek/oktatas/computer_system_security.1685346102.txt.gz · Utolsó módosítás: 2023/05/29 07:41 szerkesztette: superuser