Display language
To modulepage Generate PDF

#40713 / #3

SS 2017 - WS 2018/19

English

Software Security

6

Albayrak, Sahin

benotet

Portfolioprüfung

Zugehörigkeit


Fakultät IV

Institut für Wirtschaftsinformatik und Quantitative Methoden

34361200 FG Agententechnologien in betrieblichen Anwendungen und der Telekommunikation (AOT)

No information

Kontakt


TEL 14

Bsufka, Karsten

lehre@lists.dai-labor.de

Learning Outcomes

Students learn how to develop secure software systems. They will gain knowledge of the basics of Security engineering. There will be focus on distributed (web) applications.

Content

Secure software developed is not only focused on implementation aspects, like avoiding buffer overflows, but involves the whole the software life cycle from requirements gathering until operation. During lecture all phases will be addresses, with a special focus on the design phase and common security and misuse patterns. During the practical part students will realize smaller implementation tasks and present more details on practical aspects that had been covered in the lecture.

Module Components

Pflichtteil:

All Courses are mandatory.

Course NameTypeNumberCycleLanguageSWSVZ
Security aspects in software engineeringIV0435 L 793WiSeNo information4

Workload and Credit Points

Security aspects in software engineering (IV):

Workload descriptionMultiplierHoursTotal
Präsenzzeit15.04.0h60.0h
Preparation & Assignments15.08.0h120.0h
180.0h(~6 LP)
The Workload of the module sums up to 180.0 Hours. Therefore the module contains 6 Credits.

Description of Teaching and Learning Methods

Module consists of lectures, tutorials and students' inputs in the form of talks and system demonstrations. During the tutorials solutions will be worked on independently in small groups.

Requirements for participation and examination

Desirable prerequisites for participation in the courses:

- Basic knowledge in object oriented software development - Programming skills in Java - Basic XML knowledge

Mandatory requirements for the module test application:

This module has no requirements.

Module completion

Grading

graded

Type of exam

Portfolio examination

Type of portfolio examination

100 Punkte insgesamt

Language

English

Test elements

NamePointsCategorieDuration/Extent
(Ergebnisprüfung) 9 Assignments25written9 x 2 hours (est.)
(Lernprozessprüfung) Oral consultation75oral1 hour

Grading scale

Notenschlüssel »Notenschlüssel 2: Fak IV (2)«

Gesamtpunktzahl1.01.31.72.02.32.73.03.33.74.0
100.0pt95.0pt90.0pt85.0pt80.0pt75.0pt70.0pt65.0pt60.0pt55.0pt50.0pt

Test description (Module completion)

Die Gesamtnote gemäß § 47 (2) AllgStuPO wird nach dem Notenschlüssel 2 der Fakultät IV ermittelt.

Duration of the Module

The following number of semesters is estimated for taking and completing the module:
1 Semester.

This module may be commenced in the following semesters:
Wintersemester.

Maximum Number of Participants

The maximum capacity of students is 20.

Registration Procedures

Qispos oder Prüfungsamt und zusätzlich durch Registrierung auf der ISIS-Kursseite.

Recommended reading, Lecture notes

Lecture notes

Availability:  unavailable

 

Electronical lecture notes

Availability:  available
Additional information:
Lehrmaterial (Folien mit Notizen) wird auf der ISIS-Seite bereitgestellt.

 

Literature

Recommended literature
Bruce Schneier: Applied Cryptographie, Wiley, 1996
Christopher Steel, Ramesh Nagappan and Ray Lai. Core Security Patterns, Prentice Hall, 2006
Gary McGraw. Software Security: Building Security. Addison-Wesley, 2006.
Matt Bishop. Computer Security – Art and Science. Addison-Wesly, 2003.
Ross Anderson: Security Engineering, Wiley, 2008.

Assigned Degree Programs


This module is used in the following Degree Programs (new System):

Studiengang / StuPOStuPOsVerwendungenErste VerwendungLetzte Verwendung
This module is not used in any degree program.

Miscellaneous

No information