master
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
master [2022/01/05 12:03] – ggankhuyag | master [2023/06/01 17:06] (current) – ggankhuyag | ||
---|---|---|---|
Line 4: | Line 4: | ||
===2IMS00: Seminar IST=== | ===2IMS00: Seminar IST=== | ||
- | In this course students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the masters | + | In this course, students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the master' |
===2IMS10: Physical Aspects of Digital Security=== | ===2IMS10: Physical Aspects of Digital Security=== | ||
Line 28: | Line 28: | ||
Content | Content | ||
- | We will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in cybercrime economy (spam, phishing, infections and money laundering). We will discuss the principles of defense technology. We will touch on the economic aspects of cyber criminality, | + | We will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in the cybercrime economy (spam, phishing, infections and money laundering). We will discuss the principles of defense technology. We will touch on the economic aspects of cyber criminality, |
===2IMS25: Principles of Data Protection=== | ===2IMS25: Principles of Data Protection=== | ||
This course focuses on data protection technologies designed to prevent the dissemination of sensitive information of individuals. The course will provide a solid introduction to the most important access control models (e.g., DAC, MAC, RBAC) and their extensions for distributed systems (e.g., RT) and usage control (e.g., UCON). The course also covers industry standards in the area of access control and privacy (e.g., XACML and EPAL). See the [[http:// | This course focuses on data protection technologies designed to prevent the dissemination of sensitive information of individuals. The course will provide a solid introduction to the most important access control models (e.g., DAC, MAC, RBAC) and their extensions for distributed systems (e.g., RT) and usage control (e.g., UCON). The course also covers industry standards in the area of access control and privacy (e.g., XACML and EPAL). See the [[http:// | ||
- | =====Master Projects===== | ||
+ | ===2IMS30: Advanced Network Security=== | ||
+ | The course is divided in THREE (3) parts. | ||
+ | - The first part is dedicated to the recall of basic notions, such as cryptography, | ||
+ | - The second part of the course is dedicated to the security of IoT networks. The course will mostly follow a bottom-up approach, following the ISO/OSI Stack. We will establish several comparisons between traditional security protocols and the way these protocols are integrated into constrained IoT networks. | ||
+ | - The third part will focus on specific network security applications. It will cover network security and privacy aspects of several use-case protocols, such as avionics protocols, maritime scenarios, and GNSS architectures. | ||
+ | ===2IMS40: Intrusion Detection Laboratory=== | ||
+ | The goal of this course is to provide students with a platform to get in-depth, hands-on experience on the building blocks of cyber security monitoring: network-based, | ||
+ | To do so, the course is not focused on front classes but rather adopts a reverse classroom setup: the course will start by providing students with material covering practical and theoretical elements of security monitoring and additional material and pointers covering all three pillars, and their relationship. The students will then form groups and will be able to choose one of the building blocks to explore in depth by developing a fully-fledged laboratory activity for the other students of the course to attend. These laboratory activities will be run and coordinated, | ||
+ | The outcome of this setup is that all students will have developed, by the end of the course, a profound understanding of a technology of their choice, and at the same time get hands-on experience on a multitude of aspects of intrusion detection, through the lab activities developed by the fellow students. | ||
- | The Security Group of TU/e offers a large variety of projects that can take place in an external company or within the TU/e: | ||
- | ====External Projects: | ||
- | [[http:// | ||
- | |||
- | * [[https:// | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | * [[iot-applets-NXP|Master Project on a mechanism for automatic trust provisioning of arbitrary IoT applets at NXP Semiconductors]] | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | * [[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[http:// | ||
- | *[[https:// | ||
- | *[[https:// | ||
- | |||
- | //Projects listed here are proposed by companies and it is not guaranteed that these projects will be supervised by someone in the SEC group unless a prior agreement has been reached.// | ||
- | ====Internal Projects: | ||
- | |||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | |
master.1641380610.txt.gz · Last modified: 2022/01/05 12:03 by ggankhuyag