Faculty of Technical Sciences

Subject: E-Business Systems Security (17.E2E41)

Native organizations units: Sub-department for Applied Computer Science and Informatics
General information:
 
Category Theoretical-methodological
Scientific or art field Applied Computer Science and Informatics
Interdisciplinary No
ECTS 5
Educational goal:

Students learn about the application of techniques and methods for the protection of data in e-business systems.

Educational outcome:

Knowledge of methods and technologies for data protection. The studenta are able to use cryptographic methods and technologies, create a software for data protection in electronic business system, design and implement mechanisms for authentication and access control for different segments of e- business systems.

Course content:

Cryptography: introduction, basic concepts, cryptographic protocols, algorithms, digital signatures, digital certificates. Symmetric and asymmetric encryption algorithms, hash functions, key exchange. Cryptographic standards. PKI infrastructure: key management, establishment of PKI, certificate authorities, hierarchy of certificate authorities. Security of XML documents: digital signatures, encryption, web services security. Smart card technology: organization, standards and use. Application of security concepts at the level of operating systems, databases, and computer networks. Authentication: single-factor authentication, two-factor authentication, passwords, challenge-response principle, attacks, Kerberos, HTTP authentication. Access control: concepts, elements, policies, mechanisms and models of access control. Threat modeling.

Teaching methods:

Lectures. Computer practice. Consultations. The examination is oral. The final grade is formed on the basis of achievement in the laboratory practice classes and oral examination.

Literature:
Authors Title Year Publisher Language
William Stallings Cryptography and Network security Principles and Ppractice, 6th Edition 2014 Pearson Education, Prentice Hall English
B. Schneier Applied Cryptography Protocols, Algorithms, and Source Code in C 1995 Wiley, New York English
Blake Dournaee XML Security 2002 McGraw-Hill English
David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli Role-Based Access Control, Second Edition 2007 Artech House English
Knowledge evaluation:
Course activity Pre-examination Obligations Number of points
Oral part of the exam No Yes 50.00
Project defence Yes Yes 50.00
Lecturers:
API Image

prof. dr Sladić Goran

Full Professor

Lectures

Asistent Matković Jelena

Assistant - Master

Computational classes

Faculty of Technical Sciences

© 2024. Faculty of Technical Sciences.

Contact:

Address: Trg Dositeja Obradovića 6, 21102 Novi Sad

Phone:  (+381) 21 450 810
(+381) 21 6350 413

Fax : (+381) 21 458 133
Emejl: ftndean@uns.ac.rs

© 2024. Faculty of Technical Sciences.