Implementing and administering a secure system requires understanding of (1) assets being protected, and (2) threats, vulnerabilities, and attacks against the system. The goal of this course is to learn how to find vulnerabilities and how to protect against attacks exploiting the vulnerabilities. The approach towards this goal is to try exploiting vulnerabilities in practice, document the results of the attacks, and describe how the attacks could be prevented.
Identifying vulnerabilities and finding information about them are valuable tools in practical information security. Assuming the viewpoint of an attacker helps the students learn how to defend against attacks. Because attacks are tried out in practice, students learn to assess difficulty of attacks and defenses more realistically.
Students learn about vulnerabilities, attacks, and defenses in pairs. Course staff does not teach how to carry out attacks – one important goal for the students is to learn how to find information on their own.
NOTE!
All deliverables and lectures are in English. Presentation must be given in English.
No course material (only course web page)
Send e-mail by 24:00:
The assignment is graded as a whole. Individual deliverables are not graded separately.
Grade | Requirements |
---|---|
0 | Clearly inadequate effort or missing a deadline. |
1 | Minimum effort for credits. |
3 | Medium effort, course goals have been achieved. The students have investigated their topic well and attack tests have been done. A clear and readable paper fulfilling the other course requirements. |
5 | Excellent effort, requirements have been clearly surpassed. Paper has good motivation and analysis, attacks are well thought out and executed. Paper has been well written and is clear, and has a contribution. |
The course does not provide an environment where attack tests may be carried out. You will need to find an environment yourself. Virtualization software (such as VMware, Virtual PC, Virtual Server, Hyper-V, KVM) can be used to create test networks on a single computer. These can be used for many topics to simulate real servers and networks.