Security in Information Technology

Cource Code: Ν2-6010
Weekly Duty: 5 (3Th + 2L)
Typical Semester: 6th
Course Category:  

Learning Outcomes

Τhe course covers a considerable part of the scientific area of Security in Information Technology. The course aims to create a broad framework of theoretical and practical knowledge, which will be an additional advantage for the student in the labor market in the area of Information Technology Security.

Upon successful completion of this course, the student:

  • will be aware of the security problems in the Information and Communication Systems,
  • will recognize the vulnerabilities of the information and communication systems,
  • will be able to apply basic design concepts of security policies,
  • will know the features and security mechanisms that implement these policies,
  • will be familiar with examples that implement and apply security mechanisms on different Operating Systems,
  • will have knowledge of Security Databases
  • will be aware of the different types of firewalls and how they are used and applied,
  • will know authentication mechanisms, their role and importance,
  • will be familiar with Computer Forensics and will have knowledge of the tools that support them,
  • will know cryptography and cryptanalysis,
  • and finally, will understand Intrusion Detection Systems, their operation and the techniques used in them.

Course Content
  • Information Technology Security Overview
  • Cryptography I
  • Cryptography II
  • Operating Systems Protection
  • Data Base Security
  • Access Control
  • Network and Distributed Systems Security
  • Internet Security
  • Intrusion Detection I
  • Intrusion Detection II
  • Computer Forensics
  • Risk Analysis
  • Security Management
  • Legal and Ethical Issues

  1. Stallings, Cryptography and Network Security: Principles and Practice (6th Edition), Prentice Hall, 2013, ISBN-10: 0133354695.
  2. Bishop M., Computer Security – Art and Science, Addison-Wesley, 2003.
  3. Bishop M., Introduction to Computer Security, Addison-Wesley, 2005.
  4. Buchmann J., Introduction to Cyptography, 2nd Ed., Springer, 2004.
  5. Casey E., Handbook of Computer Crime Investigation – Forensic Tools and Technology, Academic Press, 2002.
  6. Mitnick K.D., Simon W.L., The Art of Deception, John Wiley & Sons, 2002.
  7. Oppliger R., Security Technologies for the World Wide Web, Artech House Inc., 2000.
  8. Pfleeger C.P., LawrencePfleeger S., Security in Computing, Prentice Hall, 2003.
  9. Pieprzyk J., Hardjono T., Seberry J., Fundamentals of Computer Security, Springer, 2003.
  10. Proctor P.E., The Practical Intrusion Detection Handbook, Prentice Hall, 2001.
  11. Riggs G., Network Perimeter Security – Building Defense In-Depth, Auerbach, 2004.
  12. Schultz E.E., Shumway R., Incident Response – A Strategic Guide to Handling System and Network Security Breaches, New Riders Publishing, 2002.
  13. Spitzner L., Honeypots – Tracking Hackers, Addison Wisley, 2003.
  14. Young S., Aitel D., The Hacker’s Handbook – The Strategy behind Breaking into and Defending Networks, Auerbach, 2004.

Internationalisation I18n