University of Belgrade, Faculty of organizational sciences

Department for e-business

Security methods in electronic business

STUDY PROGRAMTEACHERSCOURSE STATUSSEMESTERECTS
E-Business TechnologiesSimić B. DejanElective16

Course content


Theoretical classes

P-01: Introduction to data protection in e-business systems

P-02: Threats, vulnerabilities and risks within e-business systems. Types of attacks. Examples of attacks in e-business systems

P-03: Protection of wired networks and distributed systems.

P-04: Security at the operating system level.

P-05: Application of cryptography in the protection of electronic business systems.

P-06: Protection of e-mail servers and databases.

P-07: Web application protection,

P-08: Public key infrastructure (PKI) and data protection during transmission.

P-09: Digital signature. X509 key and digital certificate management.

P-10: Wireless network protection.

P-11: Biometric systems for user identification and authentication.

P-12: Computer network protection tools (Metasploit, Nessus, Wireshark).

P-13: Security methods in transactional systems.

P-14: Protection methods within blockchain technology.

P-15: Review of previous contents and preparation for the exam.

Practical teaching

V-01: Examples of threats in e-business. 

V-02: Examples of attacks.

V-03: Examples of protection methods in wire mesh.

V-04: Examples of protection methods within the operating system. 

V-05: Examples of cryptographic protection methods.

V-06: Examples of e-mail server and database protection. 

V-07: Examples of web application protection methods. 

V-08: Examples of protection methods in PKI systems. 

V-09: Examples of methods for creating and verifying a digital signature. Examples of digital certificate management. 

V-10: Protection methods in wireless networks.

V-11: Examples of biometric methods of user identification and authentication. 

V-12: Examples of using Metasploit, Nessus and Wireshark tools,

V-13: Examples of protection methods in transactional systems,

V-14: Examples of protection methods within blockchain technology.

V-15: Exam preparation.


The aim of the course

Introduce students to security concepts in e-business, such as security threats and vulnerabilities. Point out the most common attacks in e-business systems and demonstrate adequate defense techniques. To enable students to compare different possible data protection solutions in specific business environments and make a decision on choosing the best solution.


Course outcome

Students will acquire the skills needed to implement security methods in e-business. Students will be able to apply what they have learned in order to develop new methods of protection in electronic business in real environments.


Literature


1.Tavares, Joao Manuel R. S.,  Handbook of e-business security, CRC Press, CRC Press, Taylor & Francis Group 2019
2.William Stallings, Cryptography and Network Security: Principles and Practice, Pearson Education Limited 2017
3. Seifedine Кadry, Abdelkhalak, El Hami, Innovations in E-Systems for Business and Commerce, Apple Academic Press 2016
4. G.R. Sinha, Advances in Biometrics: Modern Methods and Implementation Strategies, Springer 2019