|Professors||Christos Xenakis Stefanos Gritzalis|
|Lecture hours||3 hours|
|Lab hours||2 hours|
|Digital resources||View on Aristarchus (Open e-Class)|
The aim of the course is to present and analyze the measures implemented on a network infrastructure, the policies adopted by the network administrator to protect the network and its resources against unauthorized access, and the effectiveness (or lack of) of them. The course focuses on the security of wired-fixed networks that use Internet technology. The mechanisms and security protocols that ensure the operation of the above networks and the data of their users are presented and analyzed.
Upon successful completion of the course, the student will be familiarized with and will apply different security measures and techniques applied to wired networks that aim to provide security services to users of a network as well as to its providers.
- Security at lower layers.
- Network layer security solutions.
- Application layer security solutions.
- Key management protocols; identity management protocols.
- Trust management.
- Distributed authentication systems and intrusion detection systems.
- Stallings W. (2007): Network Security Essentials, Applications and Standards, 3rd Edition, Prentice Hall.
- Kaufman C., Perlman R. & Speciner M. (2002): Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall.