Display language
To modulepage Generate PDF

#40390 / #4

SS 2017 - WS 2018/19

English

Computer Security - Specialization Small

6

Seifert, Jean-Pierre

benotet

Mündliche Prüfung

Zugehörigkeit


Fakultät IV

Institut für Softwaretechnik und Theoretische Informatik

34355100 FG S-Professur Security in Telecommunications

No information

Kontakt


No information

Bauroth, Stephan

lehre@sect.tu-berlin.de

No information

Learning Outcomes

The module’s qualification aims are to get to know certain basics and technical details of each lecture’s subject (Internet Security, Software Security and Telecommunication Security). Those lectures are the foundation upon which project papers and theses can be based. Having completed this course all students will have solid knowledge of each small and clearly defined subject.

Content

a) Internet Security As the common utilization of the Internet broadens, the threat from malicious programs and users increases. To counteract this development during the design of new applications and technologies, we will try to identify and discuss the different attacks and threats (e.g., worms, viruses, denial of service). Based on that countermeasures (e.g., firewalls, network intrusion detection/prevention systems, scanners) are introduced and the challenges those are facing are explained. In addition to these active security tools, secure protocols (e.g., SSL, Kerberos, TLS, VPN, IPsec, WLAN Security), key management approaches, and the security of different Internet services (e.g., E-Mail, SSH, VoIP, Network Storage) will be analysed. b) Telecommunication Security Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems as their primary means of connecting to the world around them. Given the significant focus on securing this critical infrastructure in recent years, this course creates a starting place for students and young researchers into the field of secure telecommunications networks. This course not only discusses emerging threats, along with system vulnerabilities, but also presents the open questions raised by network evolution and defence mechanisms. The course will also discuss securing current and next generation telecommunications networks. c) Software Security: Broadly speaking, this course tries to address two questions: What are common software security problems and what are their underlying causes? What are techniques, guidelines, principles, and tools to prevent or detect them? Common security problems include buffer overflows, integer overflows, SQL injection, XSS, and race conditions. Techniques to prevent or detect problems include threat modelling, check lists and coding standards, static analysis tools, code reviews, typing, static analysis, language-based security (or platform-based security), security middleware, runtime monitoring, information flow analysis, program verification, and proof-carrying code. Both, problems and solutions can be specific to the operating system, the programming language, middleware, type of application, or just down to the individual application. In order not to get lost in the forest of possibilities, we will try to understand the common themes: the root causes that lie at the heart of many problems and the fundamental good principles embodied by some of the solutions.

Module Components

Wahlpflicht:

1 from the following courses must be completed.

Course NameTypeNumberCycleLanguageSWSVZ
Software SecurityVL0434 L 982SoSeNo information2
Telecommunication SecurityVL0434 L 981WiSeNo information2

Pflicht:

All Courses are mandatory.

Course NameTypeNumberCycleLanguageSWSVZ
Internet SecurityVL0434 L 962SoSeNo information2

Workload and Credit Points

Internet Security (VL):

Workload descriptionMultiplierHoursTotal
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Software Security (VL):

Workload descriptionMultiplierHoursTotal
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Telecommunication Security (VL):

Workload descriptionMultiplierHoursTotal
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)
The Workload of the module sums up to 180.0 Hours. Therefore the module contains 6 Credits.

Description of Teaching and Learning Methods

This module features classical lectures only.

Requirements for participation and examination

Desirable prerequisites for participation in the courses:

No information

Mandatory requirements for the module test application:

This module has no requirements.

Module completion

Grading

graded

Type of exam

Oral exam

Language

English

Duration/Extent

ca. 40 Minuten

Duration of the Module

The following number of semesters is estimated for taking and completing the module:
2 Semester.

This module may be commenced in the following semesters:
Winter- und Sommersemester.

Maximum Number of Participants

This module is not limited to a number of students.

Registration Procedures

Registration for the module is handled through QISPOS.

Recommended reading, Lecture notes

Lecture notes

Availability:  unavailable

 

Electronical lecture notes

Availability:  unavailable

 

Literature

Recommended literature
Anderson, R.: Security Engineering, John Wiley, 2001
Bishop, M.: Computer Security: Art and Science, Addison Wesley, 2002
Defense Advanced Research Projects Agency (DARPA), HIGH PERFORMANCE MICROCHIP SUPPLY, www.cra.org/govaffairs/images/2005-02-HPMS_Report_Final.pdf
Denning, D.E.: Cryptography and Data Security, Addison Wesley, 1983
Eckert, C.: IT-Sicherheit, 3.Aufl., Oldenbourg-Verlag, 2004
Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994.
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O'Reilly, 2004
Gollmann, D.: Computer Security, John Wiley & Sons, 1999
Howard,M.; LeBlanc,D.: Writing Secure Code, Microsoft Press, 2001
Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008.
Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994.
Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988, http://www.cs.unomaha.edu/~stanw/gasserbook.pdf
Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. Addison-Wesley Professional, 1990.
Pfleeger, C.P.: Security in Computing, 4th ed., Prentice Hall, 2007
Sean Smith und John Marchesini: The Craft of System Security, Addison-Wesley Longman, Amsterdam
Sean W. Smith Trusted Computing Platforms: Design and Applications, Springer, Berlin
Stallings, W.: Cryptography and Network Security, 4th ed. Prentice Hall, 2006
U.S. Department of Defense Computer Security Center, Rainbow Series, http://en.wikipedia.org/wiki/Rainbow_Series
William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison-Wesley Professional, 2003.

Assigned Degree Programs


This module is used in the following Degree Programs (new System):

Studiengang / StuPOStuPOsVerwendungenErste VerwendungLetzte Verwendung
This module is not used in any degree program.

Students of other degrees can participate in this module without capacity testing.

Miscellaneous

No information