Skip to main content
Till KTH:s startsida Till KTH:s startsida

FEP3200 Networked Systems Security 8.0 credits

About course offering

For course offering

Autumn 2023 Start 30 Oct 2023 programme students

Target group

No information inserted

Part of programme

No information inserted

Periods

P2 (8.0 hp)

Duration

30 Oct 2023
15 Jan 2024

Pace of study

50%

Form of study

Normal Daytime

Language of instruction

English

Course location

KTH Campus

Number of places

Places are not limited

Planned modular schedule

Application

For course offering

Autumn 2023 Start 30 Oct 2023 programme students

Application code

50755

Contact

For course offering

Autumn 2023 Start 30 Oct 2023 programme students

Contact

Panagiotis Papadimitratos

Examiner

No information inserted

Course coordinator

No information inserted

Teachers

No information inserted
Headings with content from the Course syllabus FEP3200 (Spring 2019–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

The course will work on security, including privacy, for a spectrum of networked systems, covering: (i) Internet and TCP/IP networks, (ii) Cellular data and voice networks, (iii) wireless local and personal area networks, (iv) Internet of Things and embedded systems, (v) Wireless Sensor Networks, (vi) Mobile ad hoc and hybrid networks, such as vehicular communication systems. While the first three types of networked systems have been the predominant ones, and shall get significant attention, the course shall strive to keep a balance and present upcoming technologies. The emphasis, throughout the course, shall be on basic concepts and technologies, on common security requirements across various systems, and on how features of each system determine the state-of-the-art of security solutions.

NSS sets the ground for its companion courses, “Advanced Networked Systems Security” and “Building Networked Systems Security.” The latter ones will offer the opportunity to deal with security and privacy problems in a deeper and entirely hands-on manner.

Intended learning outcomes

At the end of the course, students shall be able to:

(i) Identify, comprehend, and analyze vulnerabilities, threats, and attacks against a variety of modern networked systems.

(ii) State clearly security properties and requirements for networked systems security solutions.

(iii) Analyze and design security protocols and mechanisms that safeguard the network operation against attacks.

(iv) Comprehend and analyzequalitatively and quantitativelythe overhead of security mechanisms.

(v) Identify and analyze best practices for security schemes deployed widely in networked systems.

Literature and preparations

Specific prerequisites

No information inserted

Recommended prerequisites

No information inserted

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

P, F

Examination

  • EXA1 - Examination, 8.0 credits, grading scale: P, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Other requirements for final grade

Assignments and exams will be graded and they are all mandatory for successfully completing the course and they are all part of the calculation of the final grade. Each component (exam and assignment) will be graded independently. The exams shall be 25% and 30% of the total grade respectively, and the assignments shall weigh the remaining 45%. Final grades: they are in the letter scale, A-F for MSc students; pass/fail for PhD students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

This course does not belong to any Main field of study.

Education cycle

Third cycle

Add-on studies

No information inserted

Contact

Panagiotis Papadimitratos

Postgraduate course

Postgraduate courses at EECS/Software and Computer Systems