EP2500 Networked Systems Security 7.5 credits

The course will focus on security, including privacy, for a spectrum of networked systems, covering: (i) Internet and TCP/IP networks, (ii) Cellular data and voice networks, (iii) wireless local and personal area networks, (iv) Internet of Things and embedded systems, (v) Wireless Sensor Networks, (vi) Mobile ad hoc and hybrid networks, such as vehicular communication systems. While the first three types of networked systems have been the predominant ones, and shall get significant attention, the course shall strive to keep a balance and present upcoming technologies, including, for example, elements on other networked infrastructures such as the smart grid. The emphasis, throughout the course, shall be on basic concepts and technologies, on common security requirements across various systems, and on how features of each system determine the state-of-the-art of security solutions.
Choose semester and course offering
Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.
Content and learning outcomes
Course contents
Basically, the course will bring up security including integrity for a spectrum of network systems that includes:
- Internet and TCP/IP networks,
- Mobile voice and data networks,
- Wireless local and personal networks,
- Wireless sensor networks,
- Mobile ad hoc and hybrid networks, such as vehicle communication systems
The emphasis in the course lies on basic concepts and technologies about joint security requirements in different systems and about how the functions in each system decide the latest security solutions.
Intended learning outcomes
After passing the course, the student should be able to
- identify, explain and analyse vulnerabilities, threats and attacks against a number of modern network systems
- state clear properties and requirements of security solutions for network systems
- analyse and design security protocols and mechanisms that protect the network operation against attacks
- explain and analyse qualitatively and quantitatively general security mechanisms
- identify and analyse best practice for security systems that currently are generally used in network systems
in order to
- become prepared for future advanced studies in the subject
- be able to handle open, real technical problems.
Course disposition
Literature and preparations
Specific prerequisites
Completed course in algorithms and data structures equivalent DD1338/DD1327/DD1320/DD1321/ID1020 or completed course in computer engineering equivalent EP1200/DD1377/IS1200/IS1500.
Active participation in a course offering where the final examination is not yet reported in Ladok is considered equivalent to completion of the course.
Registering for a course is counted as active participation.
The term 'final examination' encompasses both the regular examination and the first re-examination.
Recommended prerequisites
Basic knowledge on networking (e.g., parts of EP1100, IK1203, IK1552) and cyber-security (e.g., parts of IV1013). It is however straightforward to take the course without having this knowledge before the start of the course.
Equipment
Literature
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
Examination
- INL1 - Assignment, 2.5 credits, grading scale: P, F
- KON1 - Assignment, 2.5 credits, grading scale: P, F
- TEN1 - Examination, 2.5 credits, grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information
Course web
Further information about the course can be found on the Course web at the link below. Information on the Course web will later be moved to this site.
Course web EP2500Offered by
Main field of study
Education cycle
Add-on studies
EP2510 Advanced networked system security
Contact
Supplementary information
In this course, the EECS code of honor applies, see:
http://www.kth.se/en/eecs/utbildning/hederskodex.