EP2500 Networked Systems Security 7.5 credits

Säkra nätverkssystem

The course will focus on security, including privacy, for a spectrum of networked systems, covering: (i) Internet and TCP/IP networks, (ii) Cellular data and voice networks, (iii) wireless local and personal area networks, (iv) Internet of Things and embedded systems, (v) Wireless Sensor Networks, (vi) Mobile ad hoc and hybrid networks, such as vehicular communication systems. While the first three types of networked systems have been the predominant ones, and shall get significant attention, the course shall strive to keep a balance and present upcoming technologies, including, for example, elements on other networked infrastructures such as the smart grid. The emphasis, throughout the course, shall be on basic concepts and technologies, on common security requirements across various systems, and on how features of each system determine the state-of-the-art of security solutions.

Show course information based on the chosen semester and course offering:

Offering and execution

No offering selected

Select the semester and course offering above to get information from the correct course syllabus and course offering.

Course information

Content and learning outcomes

Course contents *

Basically, the course will bring up security including integrity for a spectrum of network systems that includes:

  • Internet and TCP/IP networks,
  • Mobile voice and data networks,
  • Wireless local and personal networks,
  • Wireless sensor networks,
  • Mobile ad hoc and hybrid networks, such as vehicle communication systems

The emphasis in the course lies on basic concepts and technologies about joint security requirements in different systems and about how the functions in each system decide the latest security solutions.

Intended learning outcomes *

After passing the course, the student should be able to

  • identify, explain and analyse vulnerabilities, threats and attacks against a number of modern network systems
  • state clear properties and requirements of security solutions for network systems
  • analyse and design security protocols and mechanisms that protect the network operation against attacks
  • explain and analyse qualitatively and quantitatively general security mechanisms
  • identify and analyse best practice for security systems that currently are generally used in network systems

in order to

  • become prepared for future advanced studies in the subject
  • be able to handle open, real technical problems.

Course Disposition

No information inserted

Literature and preparations

Specific prerequisites *

Completed course in algorithms and data structures equivalent DD1338/DD1327/DD1320/DD1321/ID1020 or completed course in computer engineering equivalent EP1200/DD1377/IS1200/IS1500.

Active participation in a course offering where the final examination is not yet reported in LADOK is considered equivalent to completion of the course. This applies only to students who are first-time registered for the prerequisite course offering or have both that and the applied-for course offering in their individual study plan.

Recommended prerequisites

Basic knowledge on networking (e.g., parts of EP1100, IK1203, IK1552) and cyber-security (e.g., parts of IV1013). It is however straightforward to take the course without having this knowledge before the start of the course.

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale *

A, B, C, D, E, FX, F

Examination *

  • INL1 - Assignment, 2.5 credits, Grading scale: P, F
  • KON1 - Assignment, 2.5 credits, Grading scale: P, F
  • TEN1 - Examination, 2.5 credits, Grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Panagiotis Papadimitratos

Ethical approach *

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course web

Further information about the course can be found on the Course web at the link below. Information on the Course web will later be moved to this site.

Course web EP2500

Offered by

EECS/Computer Science

Main field of study *

Computer Science and Engineering, Information and Communication Technology

Education cycle *

Second cycle

Add-on studies

EP2510 Advanced networked system security

Contact

Panagiotis Papadimitratos papadim@kth.se

Supplementary information

In this course, the EECS code of honor applies, see:
http://www.kth.se/en/eecs/utbildning/hederskodex.