User Tools

Site Tools


bachelor

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
bachelor [2017/10/20 14:20]
root
bachelor [2017/10/20 14:37] (current)
root
Line 17: Line 17:
     * This course is divided into two parts: complex networks (part I) and information security (part II).     * This course is divided into two parts: complex networks (part I) and information security (part II).
       *  The goal of the first part of the course is to introduce students to the state of the art in terms of argumentation,​ models, and algorithms developed for understanding complex networks of humans and devices.       *  The goal of the first part of the course is to introduce students to the state of the art in terms of argumentation,​ models, and algorithms developed for understanding complex networks of humans and devices.
-      * The goal of the second part is to introduce the concepts of information risk, threats, vulnerabilities,​ impact; confidentiality,​ integrity, authenticity. Shannon’s communication model for conventional encryption. ​Symmetric ​and asymmetric cryptography,​ randomness in key generation and encryption. Cryptographic ​attacks. Physical random number generators and Physical Unclonable Functions ​(PUFs)Algorithms for turning non-uniform physical sources of randomness into uniform sources. Randomness tests. Uses of PUFs. Infection mechanisms ​and dynamics. Malware: viruses, botnets, and ransomware. The economics of the exploits market: criminal business models. Life cycle of exploits. Examples of exploits. Study of the Russian black market and traded technology.+      * The goal of the second part is to introduce the concepts of information risk, threats, vulnerabilities,​ impact; confidentiality,​ integrity, authenticity. Shannon’s communication model for conventional encryption. ​Cryptography ​and cryptographic ​attacks. Physical random number generators and Physical Unclonable Functions. ​Malwares ​and Exploits. Study of the Russian black market and traded technology.
bachelor.txt · Last modified: 2017/10/20 14:37 by root