FI:PV222 Security Architectures - Course Information
PV222 Security Architectures
Faculty of InformaticsSpring 2009
- Extent and Intensity
- 3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
- Teacher(s)
- Geraint Price (lecturer), Dr. Geraint Price (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Thu 26. 3. 16:00–19:50 C416, Thu 2. 4. 16:00–19:50 C416, Thu 9. 4. 16:00–19:50 C416, Thu 16. 4. 16:00–19:50 C416, Thu 23. 4. 16:00–19:50 C416, Thu 30. 4. 16:00–19:50 C416
- Prerequisites
- PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols ||SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054 - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30 - fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-BI)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-GE)
- Informatics with another discipline (programme FI, B-GK)
- Informatics with another discipline (programme FI, B-CH)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (programme FI, B-IN)
- Informatics (programme FI, N-IN)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Image Processing (programme FI, N-AP)
- Course objectives
- This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
- Syllabus
- This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
- Assessment methods
- Colloquial discussion at the end of the lectures = last week of April. Homework and active participation in the lectures shall be also considered.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught only once.
- Enrolment Statistics (Spring 2009, recent)
- Permalink: https://is.muni.cz/course/fi/spring2009/PV222