T-110.5200 Laboratory Works on Information Security (4 cr)

Laboratory assignments



Retrieval of the reports

Reports of the laboratory assignments must be in plaintext (NOT rtf, doc or pdf etc.). Copy them to the directory /root/answers/ on the first laboratory machine. They will be automatically fetched from there at each laboratory assignment deadline. You can write your reports in English or in Finnish.

Please write your reports using these files.

Update: You may name your report documents any way you like, but please make sure you put your name and student number in the documents.

Deadlines

Each assignment has a deadline before which the laboratory results must be ready for retrieval (see the table below). Assignments that can not be retrieved will not be graded, unless agreed beforehand with the course staff. Remember, that it's better to do the assignments as early as possible to avoid the last days' rush!

Laboratory assignments

The number in parenthesis after the assignment name indicates the difficulty of the assignment (1-5). (5) means, that you need to read the assignment carefully through and understand what is done in each phase. In addition to this, it is recommended that you prepare the commands and/or configuration files beforehand - while (1) means, that if you are familiar with the subject, you can just go ahead and complete the assignment.You can access your TKK Computing Centre or Niksula account using SSH on the laboratory computers assigned to you.

 

Assignments and deadlines

If you are familiar with Unix and exercise topics beforehand, it is recommended to do all exercises straight away. This will reduce last day rushes and makes it easier to evaluate the reports.

Assignment

Description

Reports Deadline (always Friday)

Network Tools (1)

You will learn to use some basic Unix network tools. This assignment can only be included in either T-110.5100 OR T-110.5200 course.

2.10.2009 23:59:59

Network Filesystems (3)

You will setup various network filesystems. You have to compare network filesystems shortly using internet (or book) sources and your own experiments.

23.10.2009 23:59:59

VPN (3)

 

You will configure and examine a virtual private network.

13.11.2009 23:59:59

Crypto-Filesystem (3)

You will create encrypted filesystem in a removable disk.

27.11.2009 23:59:59

Firewall (3)

You will setup a simple routing firewall and a web proxy.

11.12.2009 23:59:59

 

Taking notes

  • In your answers you are usually required to include the typed commands and their outputs, so you may find the commands script(1) and screen(1) useful.
  • There are a few commonly used text editors installed, notably emacs(1) and vi(1).
  • Remember to save your work outside of the laboratory class. Use scp(1) or sftp(1).