INFORMATION SYSTEMS SECURITY

Course Code: INFO 315 • Study year: III • Academic Year: 2024-2025
Domain: Computer Science • Field of study: Computer Science
Type of course: Elective (1 of 2)
Language of instruction: Romanian
Erasmus Language of instruction: English
Name of lecturer: Arpad Incze
Seminar tutor: Arpad Incze
Form of education Full-time
Form of instruction: Class / Seminary
Number of teaching hours per semester: 72
Number of teaching hours per week: 6
Semester: Summer
Form of receiving a credit for a course: Grade
Number of ECTS credits allocated 6

Course aims:

Acquiring the fundamental knowledge about concepts, mechanisms, problemes and tools in conjunction with computer system/network security
Understanding the security related side of design and implementation of computer systems
Understanding of attacks on security and prevention and defence mechanism and tools to prevent or defend those attacks
Learning the mechanism methods and techniques of secure programming

Course Entry Requirements:

Computer networks

Course contents:

Course based on CISCO Security Essentials module Security issues and principles Security of operating systems . Access control Network security.Vulnerabilities, Attacks types Wireless network security Network security. Firewalls and IDS Virus and malware Software security. Defensive programming Web application security Penetration testing techniques Security auditing and security policies Introduction to cryptography. History and basics. Symmetric and Asymmetric cryptography Exam

Teaching methods:

On CISCO netacad paformLecture, discussion, presentation, scenario

Learning outcomes:

CISCO certificate. A good knowledge of security issues is mandatory for every computer system/network administrator in order to design and deploy a safe working IT environment. Also computer programmers, especially those who work in the field of WEB applications must know the security related issues regarding WEB programming.

Learning outcomes verification and assessment criteria:

Course Final evaluation: Project presentation. 50%Seminar/laboratory Continuous assessment 50%

Recommended reading:

Dieter Gollmann, Computer Security. ed. 3, Wiley,, 2011,
R. Seacord,, CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems 2nd edition, AddisonWesley, 2014,
M. Down, J. McDonald, J. Schuh, The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities, AddisonWesley, 2007,